Jargon file v2.1.5 28 NOV 1990 -- part 6 of 6
Eric S. Raymond
eric at snark.thyrsus.com
Thu Nov 29 05:00:42 AEST 1990
= T =
T (tee) 1. [from LISP terminology for ``true''] Yes. Usage: used in
reply to a question, particularly one asked using the ``-P''
convention). See NIL. 2. See TIME T. 3. In transaction-processing
circles, an abbreviation for the noun ``transaction''.
TALK MODE n. The state a terminal is in when linked to another via a
bidirectional character pipe to support on-line dialogue between
two or more users. Talk mode has a special set of jargon words,
used to save typing, which are not used orally:
BCNU Be seeing you.
BTW By the way...
BYE? Are you ready to unlink? (This is the standard way to
end a com mode conversation; the other person types
BYE to confirm, or else continues the conversation.)
CUL See you later.
FOO? A greeting, also meaning R U THERE? Often used in the
case of unexpected links, meaning also ``Sorry if I
butted in'' (linker) or ``What's up?'' (linkee).
FYI For your information...
FYA For your amusement...
GA Go ahead (used when two people have tried to type
simultaneously; this cedes the right to type to
the other).
HELLOP A greeting, also meaning R U THERE? (An instance
of the ``-P'' convention.)
NIL No (see the main entry for NIL).
O Over to you.
OO Over and out.
OBTW Oh, by the way...
R U THERE? Are you there?
SEC Wait a second (sometimes written SEC...).
T Yes (see the main entry for T).
TNX Thanks.
TNX 1.0E6 Thanks a million (humorous).
WTF The universal interrogative particle. WTF knows what
it means?
WTH What the hell
<double CRLF> When the typing party has finished, he types
two CRLFs to signal that he is done; this leaves a
blank line between individual ``speeches'' in the
conversation, making it easier to re-read the
preceding text.
<name>: When three or more terminals are linked, each speech
is preceded by the typist's login name and a colon (or
a hyphen) to indicate who is typing. The login name
often is shortened to a unique prefix (possibly a
single letter) during a very long conversation.
Most of the above ``sub-jargon'' is used at both Stanford and MIT.
Several of these are also common in EMAIL, esp. FYI, FYA, BTW,
BCNU, and CUL A few other abbrevs have been reported from
commercial networks such as GEnie and Compuserve where on-line
`live' chat including more than two people is common and usually
involves a more `social' context, notably
<g> grin
BRB be right back
HHOJ ha ha only joking
HHOS HA HA ONLY SERIOUS
LOL laughing out load
ROTF rolling on the floor
AFK away from keyboard
b4 before
CU l8tr see you later
MORF Male or Female?
TTFN ta-ta for now
OIC Oh, I see
rehi hello again
These are not used at universities; conversely, most of the people
who know these are unfamiliar with FOO?, BCNU, HELLOP, NIL, and T.
TANKED adj. Same as DOWN, used primarily by UNIX hackers. See also
HOSED. Popularized as a synonym for ``drunk'' by Steve Dallas in
the late lamented ``Bloom County'' comix.
TASTE n. [primarily MIT-DMS] The quality in programs which tends to be
inversely proportional to the number of features, hacks, and kluges
programmed into it. Also, TASTY, TASTEFUL, TASTEFULNESS. ``This
feature comes in N tasty flavors.'' Although TASTEFUL and
FLAVORFUL are essentially synonyms, TASTE and FLAVOR are not.
TCB (tee see bee) [IBM] Trouble Came Back. Intermittent or
difficult-to reproduce problem which has failed to respond to
neglect. Compare HEISENBUG.
TELERAT (tel'@-rat) n. Unflattering hackerism for ``Teleray'', a line
of extremely losing terminals. See also TERMINAK, SUN-STOOLS,
HP-SUX.
TELNET (telnet) v. To communicate with another ARPAnet host using the
TELNET program. TOPS-10 people use the word IMPCOM since that is
the program name for them. Sometimes abbreviated to TN. ``I
usually TN over to SAIL just to read the AP News.''
TENSE adj. Of programs, very clever and efficient. A tense piece of
code often got that way because it was highly bummed, but sometimes
it was just based on a great idea. A comment in a clever display
routine by Mike Kazar: ``This routine is so tense it will bring
tears to your eyes. Much thanks to Craig Everhart and James
Gosling for inspiring this hack attack.'' A tense programmer is
one who produces tense code.
TERAFLOP CLUB (ter'a-flop kluhb) n. Mythical group of people who
consume outragous amounts of computer time in order to produce a
few simple pictures of glass balls with intricate ray tracing
techniques. Cal Tech professor James Kajiya is said to be the
founding member.
TERMINAK (ter'mi-nak) [Caltech, ca. 1979] n. Any malfunctioning
computer terminal. A common failure mode of Lear-Siegler ADM3a
terminals caused the ``L'' key to produce the ``K'' code instead;
complaints about this tended to look like ``Terminak #3 has a bad
keyboard. Pkease fix.'' See SUN-STOOLS, TELERAT, HP-SUX.
TERMINAL ILLNESS n. 1. Syn. with RASTER BURN. 2. The `burn-in'
condition your CRT tends to get if you don't have a screen saver.
TERPRI (ter'pree) [from the LISP 1.5 (and later, MacLISP) function to
start a new line of output] v. To output a CRLF (q.v.).
THANKS IN ADVANCE [USENET] Conventional net.politeness ending a posted
request for information or assistance. Sometimes written
``advTHANKSance''. See ``NET.'', NETIQUETTE.
THEOLOGY n. 1. Ironically used to refer to RELIGIOUS ISSUES. 2.
Technical fine points of an abstruse nature, esp. those where the
resolution is of theoretical interest but relatively MARGINAL with
respect to actual use of a design or system. Used esp. around
software issues with a heavy AI or language design component.
Example: the deep- vs. shallow-binding debate in the design of
dynamically-scoped LISPS.
THEORY n. Used in the general sense of idea, plan, story, or set of
rules. ``What's the theory on fixing this TECO loss?'' ``What's
the theory on dinner tonight?'' (``Chinatown, I guess.'')
``What's the current theory on letting lusers on during the day?''
``The theory behind this change is to fix the following well-known
screw...''
THINKO (thin'ko) [by analogy with `typo'] n. A bubble in the stream of
consciousness; a momentary, correctable glitch in mental
processing, especially one involving recall of information learned
by rote. Compare MOUSO.
THRASH v. To move wildly or violently, without accomplishing anything
useful. Paging or swapping systems which are overloaded waste most
of their time moving data into and out of core (rather than
performing useful computation), and are therefore said to thrash.
THREE-FINGER SALUTE n. Syn. for VULCAN NERVE PINCH.
THUNK n. 1. An expression, frozen together with its environment for
later evaluation if and when needed. The process of unfreezing a
THUNK is called `forcing'. 2. People and and activities scheduled
in a thunklike manner. ``It occurred to me the other day that I am
rather accurately modelled by a thunk -- I frequently need to be
forced to completion.'' -- paraphrased from a .plan file.
TICK n. 1. Interval of time; basic clock time on the computer.
Typically 1/60 second. See JIFFY. 2. In simulations, the discrete
unit of time that passes ``between'' iterations of the simulation
mechanism. In AI applications, this amount of time is often left
unspecified, since the only constraint of interest is that caused
things happen after their causes. This sort of AI simulation is
often pejoratively referred to as ``tick-tick-tick'' simulation,
especially when the issue of simultaneity of events with long,
independent chains of causes is handwaved.
TIME T (tiem tee) n. 1. An unspecified but usually well-understood
time, often used in conjunction with a later time T+1. ``We'll
meet on campus at time T or at Louie's at time T+1.'' 2. SINCE (OR
AT) TIME T EQUALS MINUS INFINITY: A long time ago; for as long as
anyone can remember; at the time that some particular frob was
first designed.
TIP OF THE ICE-CUBE [IBM] n. The visible part of something small and
insignificant. Used as an ironic comment in situations where ``tip
of the iceberg'' might be appropriate if the subject were actually
nontrivial.
TIRED IRON [IBM] n. Hardware that is perfectly functional but enough
behind the state of the art to have been superseded by new
products, presumably with enough improvement in bang-per-buck that
the old stuff is starting to look a bit like a DINOSAUR.
TLA (tee el ay) [Three-Letter-Abbreviation] n. 1. Self-describing
acronym for a species with which computing terminology is infested.
2. Any confusing acronym at all. Examples include MCA, FTP, SNA,
CPU, MMU, SCCS, DMU, FPU, TLA, NNTP. People who like this looser
usage argue that not all TLAs have three letters, just as not all
four letter words have four letters.
TOAST 1. n. Any completely inoperable system, esp. one that has just
crashed; ``I think BUACCA is toast.'' 2. v. To cause a system to
crash accidentally, especially in a manner that requires manual
rebooting. ``Rick just toasted harp again.''
TOASTER n. 1. The archetypal really stupid application for an embedded
microprocessor controller esp. `toaster oven'; often used in
comments which imply that a scheme is inappropriate technology.
``DWIM for an assembler? That'd be as silly as running UNIX on
your toaster!'' 2. A very very dumb computer. ``You could run this
program on any dumb toaster.'' See BITTY BOX, TOASTER, TOY.
TOOL 1. n. A program primarily used to create other programs, such as
a compiler or editor or cross-referencing program. Oppose APP,
OPERATING SYSTEM. 2. [UNIX] An application program with a simple,
``transparent'' (typically text-stream) interface designed
specifically to be used in programmed combination with other tools
(see FILTER). 3. [MIT] v.i. To work; to study. See HACK (def #9).
TOPS-10 (tops-ten) n. DEC's proprietary OS for the fabled PDP-10
machines, long a favorite of hackers but now effectively extinct. A
fountain of hacker folklore; see Appendix B. See also ITS, TOPS-20,
TWENEX, VMS, OPERATING SYSTEM.
TOPS-20 (tops-twen'tee) n. See TWENEX.
TOURIST [from MIT's ITS system] n. A guest on the system, especially
one who generally logs in over a network from a remote location for
games and other trivial purposes. One step below LUSER. TOURISTIC
is often used as a pejorative, as in ``losing touristic scum''.
TOY (toy) n. A computer system; always used with qualifiers. 1. NICE
TOY One which supports the speaker's hacking style adequately. 2.
JUST A TOY A machine that yields insufficient COMPUTRONS for the
speaker's preferred uses (this is not condemnatory as is BITTY BOX,
toys can at least be fun). See also GET A REAL COMPUTER, BITTY BOX.
TOY PROBLEM [AI] n. A deliberately simplified or even oversimplified
case of a challenging problem used to investigate, prototype, or
test algorithms for the real problem. Sometimes used pejoratively.
See also GEDANKEN.
TRAP 1. n. A program interrupt, usually used specifically to refer to
an interrupt caused by some illegal action taking place in the user
program. In most cases the system monitor performs some action
related to the nature of the illegality, then returns control to
the program. See UUO. 2. v. To cause a trap. ``These
instructions trap to the monitor.'' Also used transitively to
indicate the cause of the trap. ``The monitor traps all
input/output instructions.''
TRASH v. To destroy the contents of (said of a data structure). The
most common of the family of near-synonyms including MUNG, MANGLE
and SCRIBBLE.
TRIVIAL adj. 1. In explanation, too simple to bother detailing. 2. Not
worth the speaker's time. 3. Complex, but solvable by methods so
well-known that anyone not utterly CRETINOUS would have thought of
them already. Hackers' notions of triviality may be quite at
variance with those of non-hackers. See NONTRIVIAL, UNINTERESTING.
TROGLODYTE [Commodore] n. A hacker who never leaves his cubicle. The
term `Gnoll' (from D&D) is also reported.
TROGLODYTE MODE [Rice University] n. Programming with the lights
turned off, sunglasses on, and the (character) terminal inverted
(black on white) because you've been up for so many days straight
that your eyes hurt. Loud music blaring from a stereo stacked in
the corner is optional but recommended. See LARVAL STAGE, MODE.
TROJAN HORSE n. A program designed to break security or damage a
system that is disguised as something else benign, such as a
directory lister or archiver. See VIRUS, WORM.
TRUE-HACKER [analogy with ``trufan'' from SF fandom] n. One who
exemplifies the primary values of hacker culture, esp. competence
and helpfulness to other hackers. A high complement. ``He spent
six hours helping me bring up UUCP and netnews on my FOOBAR 4000
last week -- unequivocally the act of a true-hacker.'' Compare
DEMIGOD, oppose MUNCHKIN.
TTY (tee-tee-wie [UNIX], titty [ITS]) n. 1. Terminal of the teletype
variety, characterized by a noisy mechanical printer, a very
limited character set, and poor print quality. Usage: antiquated
(like the TTYs themselves). 2. [especially UNIX] Any terminal at
all; sometimes used to refer to the particular terminal controlling
a job.
TUBE n. A CRT terminal. Never used in the mainstream sense of TV; real
hackers don't watch TV, except for Loony Toons and Bullwinkle &
Rocky and the occasional cheesy old swashbuckle movie.
TUNE [from automotive or musical usage] v. To optimize a program or
system for a particular environment. One may `tune for time'
(fastest execution) `tune for space' (least memory utilization) or
`tune for configuration' (most efficient use of hardware). See BUM,
HOT SPOT, HAND-HACK.
TWEAK v. To change slightly, usually in reference to a value. Also
used synonymously with TWIDDLE. See FROBNICATE and FUDGE FACTOR.
TWENEX (twe-neks) n. The TOPS-20 operating system by DEC. So named
because TOPS-10 was a typically crufty DEC operating system for the
PDP-10. BBN developed their own system, called TENEX (TEN
EXecutive), and in creating TOPS-20 for the DEC-20 DEC copied TENEX
and adapted it for the 20. Usage: DEC people cringe when they hear
TOPS-20 referred to as ``Twenex'', but the term seems to be
catching on nevertheless. Release 3 of TOPS-20 is sufficiently
different from release 1 that some (not all) hackers have stopped
calling it TWENEX, though the written abbreviation ``20x'' is still
used.
TWIDDLE n. 1. tilde (ASCII 176, ``~''). Also called ``squiggle'',
``sqiggle'' (sic--pronounced ``skig'gul''), and ``twaddle'', but
twiddle is by far the most common term. 2. A small and
insignificant change to a program. Usually fixes one bug and
generates several new ones. 3. v. To change something in a small
way. Bits, for example, are often twiddled. Twiddling a switch or
knob implies much less sense of purpose than toggling or tweaking
it; see FROBNICATE.
TWINK (twink) [UCSC] n. Equivalent to READ-ONLY USER.
TWO-TO-THE-N quant. Used like N, but referring to bigger numbers. ``I
have two to the N things to do before I can go out for lunch''
means you probably won't show up.
TWO-PI q. The number of years it takes to finish one's thesis. Occurs
in stories in the form: ``He started on his thesis; two pi years
later...''.
= U =
UNINTERESTING adj. 1. Said of a problem which, while NONTRIVIAL, can
be solved simply by throwing sufficient resources at it. 2. Also
said of problems for which a solution would neither advance the
state of the art nor be fun to design and code. True hackers regard
uninteresting problems as an intolerable waste of time, to be
solved (if at all) by lesser mortals. See WOMBAT, SMOP.
U*IX, UN*X n. Used to refer to the Unix operating system (trademark
and/or copyright AT&T) in writing, but avoiding the need for the
ugly (tm) typography. Also used to refer to any or all varieties
of Unixoid operating systems. Ironically, some lawyers now claim
(1990) that the requirement for superscript-tm has no legal force,
but the asterisk usage is entrenched anyhow.
UNWIND THE STACK v. 1. During the execution of a procedural language
one is said to `unwind the stack' from a called procedure up to a
caller when one discards the stack frame and any number of frames
above it, popping back up to the level of the given caller. In C
this is done with longjmp/setjmp; in LISP with THROW/CATCH. This
is sometimes necessary when handling exceptional conditions. See
also SMASH THE STACK. 2. People can unwind the stack as well, by
quickly dealing with a bunch of problems ``Oh hell, let's do lunch.
Just a second while I unwind my stack''.
UNWIND-PROTECT [MIT, from the name of a LISP operator] n. A task you
must remember to perform before you leave a place or finish a
project. ``I have an unwind-protect to call my advisor.''
UNIX (yoo'nix) [In the authors' words, ``A weak pun on MULTICS''] n. A
popular interactive time-sharing system originally invented in 1969
by Ken Thompson after Bell Labs left the MULTICS project, mostly so
he could play SPACEWAR on a scavenged PDP7. The turning point in
UNIX's history came when it was reimplemented almost entirely in C
in 1974, making it the first source-portable operating system.
Fifteen years and a lot of changes later UNIX is the most widely
used multiuser general-purpose operating system in the world. This
fact probably represents the single most important victory yet of
hackerdom over industry opposition. See VERSION 7, BSD UNIX, USG
UNIX.
UP adj. 1. Working, in order. ``The down escalator is up.'' 2.
BRING UP: v. To create a working version and start it. ``They
brought up a down system.''
UPLOAD [uhp'lohd] v. 1. To transfer code or data over a digital comm
line from a smaller `client' system to a larger `host' one. Oppose
DOWNLOAD. 2. [speculatively] To move the essential patterns and
algorithms which make up one's mind from one's brain into a
computer. Only those who are convinced that such patterns and
algorithms capture the complete essence of the self view this
prospect with aplomb.
URCHIN n. See MUNCHKIN.
USENET (yooz'net) n. A distributed bulletin board system supported
mainly by UNIX machines, international in scope and probably the
largest non-profit information utility in existence. As of early
1990 it hosts over 300 topic groups and distributes up to 15
megabytes of new technical articles, news, discussion, chatter, and
FLAMAGE every day. See NEWSGROUP.
USER n. A programmer who will believe anything you tell him. One who
asks annoying questions. Identified at MIT with ``loser'' by the
spelling ``luser''. See REAL USER. [Note by GLS: I don't agree
with RF's definition at all. Basically, there are two classes of
people who work with a program: there are implementors (hackers)
and users (losers). The users are looked down on by hackers to a
mild degree because they don't understand the full ramifications of
the system in all its glory. (A few users who do are known as real
winners.) It is true that users ask questions (of necessity).
Very often they are annoying or downright stupid.]
USER FRIENDLY adj. Programmer-hostile. Generally used by hackers in a
hostile tone, to describe systems which hold the user's hand so
obsessively that they make it painful for the more experienced and
knowledgeable to get any work done. See MENUITIS, DROOL-PROOF
PAPER, MACINTRASH.
USER-OBSEQUIOUS adj. Emphatic form of USER FRIENDLY. Connotes a system
so verbose, inflexible, and determinedly simple-minded that it is
nearly unusable. ``Design a system any fool can use and only a fool
will want to use it''.
USG UNIX (yoo-ess-jee yoo'nix) n. Refers to AT&T UNIX versions after
VERSION 7, especially System III and System V releases 1, 2 and 3.
So called because at that time AT&T's support crew was called the
`Unix Support Group' See BSD UNIX.
= V =
VADDING (vad'ing) [from VAD, a permutation of ADV (i.e. ADVENT
(q.v.)), used to avoid a particular sysadmin's continual
search-and-destroy sweeps for the game] n. A leisure-time activity
of certain hackers involving the covert exploration of the
``secret'' parts of large buildings -- basements, roofs, freight
elevators, maintenance crawlways, steam tunnels and the like. A few
go so far as to learn locksmithing in order to synthesize vadding
keys. The verb is `to vad'. The most extreme and dangerous form of
vadding is ELEVATOR RODEO, aka ELEVATOR SURFING, a sport played by
wrasslin' down a thousand-pound elevator car with a three-foot
piece of string, and then exploiting this mastery in various
stimulating ways (such as elevator hopping, shaft exploration,
rat-racing and the ever-popular drop experiments). Kids, don't try
this at home!
VANILLA adj. Ordinary flavor, standard. See FLAVOR. When used of
food, very often does not mean that the food is flavored with
vanilla extract! For example, ``vanilla-flavored wonton soup'' (or
simply ``vanilla wonton soup'') means ordinary wonton soup, as
opposed to hot and sour wonton soup. Applied to hardware and
software. As in ``Vanilla Version 7 UNIX can't run on a vanilla
11/34''.
VANNEVAR (van'@-var) n. A bogus technological prediction or foredoomed
engineering concept, esp. one which fails by implicitly assuming
that technologies develop linearly, incrementally, and in isolation
from one another when in fact the learning curve tends to be highly
nonlinear, revolutions are common, and competition is the rule. The
prototype was Vannevar Bush's prediction of ``electronic brains''
the size of the Empire State Building with a
Niagara-Falls-equivalent cooling system for their tubes and relays,
at a time when the semiconductor effect had already been
demonstrated. Other famous vannevars have included commercial LISP
machines and a paper from the late 1970s that purported to prove
maximum achievable areal densities for ICs less than those
routinely achieved five years later.
VAPORWARE n. Products announced far in advance of any shipment (which
may or may not actually take place).
VAR (veir, vahr) n. Short for ``variable''. Compare ARG, PARAM.
VAX n. (vaks) [from Virtual Address eXtended] 1. The most successful
minicomputer design in industry history, possibly excepting its
immediate ancestor the PDP-11. Between its release in 1978 and
eclipse by KILLER MICROS after about 1986 the VAX was probably the
favorite hacker machine of them all, esp. after the 1982 release of
4.2BSD UNIX (see BSD UNIX). Esp. noted for its large,
assembler-programmer-friendly instruction set, an asset which
became a liability after the RISC revolution following about 1985.
2. A major brand of vacuum cleaner in Britain. Cited here because
its alleged sales pitch, ``Nothing sucks like a VAX!'' became a
sort of battle-cry of RISC partisans. Ironically, the slogan was
actually that of a rival brand called Electrolux.
VAXEN (vak'sn) [from ``oxen'', perhaps influenced by ``vixen''] n. pl.
The plural of VAX (a DEC machine). See BOXEN.
VEEBLEFESTER (vee'b at l-fes-tr) [from the ``Born Loser'' comix via
Commodore; prob originally from Mad Magazine's ``Veeblefeetzer'' c.
1960] n. Any obnoxious person engaged in the alleged professions
of marketing or management. Antonym of HACKER. Compare SUIT,
MARKETROID.
VENUS FLYTRAP (vee'n:s flie'trap) [after the plant] n. See FIREWALL.
VERBIAGE (ver'bee- at j) [IBM] n. Documentation.
VERSION 7 alt. V7 (vee-se'v at n) n. The 1978 unsupported release of UNIX
(q.v.) ancestral to all current commercial versions. Before the
release of the POSIX/SVID standards V7's features were often
treated as a UNIX portability baseline. See BSD, USG UNIX, UNIX.
VIRGIN adj. Unused, in reference to an instantiation of a program.
``Let's bring up a virgin system and see if it crashes again.''
Esp. useful after contracting a VIRUS (q.v.) through SEX (q.v.).
Also, by extension, unused buffers and the like within a program.
VIRUS [from SF] n. A cracker program that propagates itself by
`infecting' (embedding itself in) other trusted programs,
especially operating systems. See WORM, TROJAN HORSE.
VMS (vee em ess) n. DEC's proprietary operating system for their VAX
minicomputer; one of the seven or so environments that looms
largest in hacker folklore. Many UNIX fans generously concede that
VMS would probably be the hacker's favorite commercial OS if UNIX
didn't exist; though true, this makes VMS fans furious. See also
TOPS-10, TOPS-20, UNIX.
VIRTUAL adj. 1. Common alternative to LOGICAL (q.v.), but never used
with compass directions. 2. Performing the functions of. Virtual
memory acts like real memory but isn't.
VIRTUAL REALITY n. A form of network interaction incorporating aspects
of role-playing games, interactive theater, improvisational comedy
and ``true confessions'' magazines. In a ``virtual reality'' forum
(such as USENET's alt.callahans newsgroup or the MUD experiments on
Internet) interaction between the participants is written like a
shared novel complete with scenery, ``foreground characters'' which
may be personae utterly unlike the people who write them, and
common ``background characters'' manipulable by all parties. The
one iron law is that you may not write irreversible changes to a
character without the consent of the person who ``owns'' it.
Otherwise anything goes. See BAMF.
VISIONARY n. One who hacks vision (in an AI context, such as the
processing of visual images).
VULCAN NERVE PINCH n. [From the old Star Trek TV series via Commodore
Amiga hackers] The keyboard combination that forces a soft-boot or
jump to ROM monitor (on machines that support such a feature). On
many micros this is Ctrl-Alt-Del. Also called THREE-FINGER SALUTE.
= W =
WABBIT (wabb'it) [almost certainly from Elmer Fudd's immortal line
``you wascal wabbit!''] n. 1. A legendary early hack reported on
the PDP-10s at RPI and elsewhere around 1978. The program would
reproduce itself twice every time it was run, eventually crashing
the system. 2. By extension, any hack that includes infinite
self-replication but is not a VIRUS or WORM. See also COOKIE
MONSTER.
WALDO (wahl'doh) [probably taken from the story ``Waldo'', by
Heinlein, which is where the term was first used to mean a
mechanical adjunct to a human limb] Used at Harvard, particularly
by Tom Cheatham and students, instead of FOOBAR as a meta-syntactic
variable and general nonsense word. See FOO, BAR, FOOBAR, QUUX.
WALKING DRIVES An occasional failure mode of magnetic-disk drives back
in the days when they were 14'' wide WASHING MACHINES. Those old
DINOSAURS carried terrific angular momentum; the combination of a
misaligned spindle or worn bearings and stick-slip interactions
with the floor could cause them to ``walk'' across a room, lurching
alternate corners forward a couple of millimeters at a time. This
could also be induced by certain patterns of drive access (a fast
seek across the whole width of the disk, followed by a slow seek in
the other direction). It is known that some bands of old-time
hackers figured out how to induce disk-accessing patterns that
would do this to particular drive models and held disk-drive races.
This is not a joke!
WALL [shortened form of HELLO WALL, apparently from the phrase ``up
against a blank wall''] [WPI] interj. 1. An indication of
confusion, usually spoken with a quizzical tone. ``Wall??'' 2. A
request for further explication. Compare OCTAL FORTY.
WALL TIME n. 1. `Real world' time (what the clock on the wall shows)
as opposed to the system clock's idea of time. 2. The real running
time of a program, as opposed to the number of CLOCKS required to
execute it (on a timesharing system these will differ, as no one
program gets all the CLOCKS).
WALLPAPER n. A file containing a listing (e.g., assembly listing) or
transcript, esp. a file containing a transcript of all or part of a
login session. (The idea was that the LPT paper for such listings
was essentially good only for wallpaper, as evidenced at SAIL where
it was used as such to cover windows.) Usage: not often used now,
esp. since other systems have developed other terms for it (e.g.,
PHOTO on TWENEX). The term possibly originated on ITS, where the
commands to begin and end transcript files were :WALBEG and
:WALEND, with default file DSK:WALL PAPER.
WASHING MACHINE n. Old-style hard disks in floor-standing cabinets. So
called because of the size of the cabinet and the ``top-loading''
access to the media packs. See WALKING DRIVES.
WEASEL [Cambridge University] A ``naive user'', one who deliberately
or accidentally does things which are stupid or ill-advised.
Roughly synonymoius with LUSER.
WEDGED [from ``head wedged up ass''] adj. 1. To be in a locked state,
incapable of proceeding without help. (See GRONK.) Often refers
to humans suffering misconceptions. ``The swapper is wedged.''
This term is sometimes used as a synonym for DEADLOCKED (q.v.). 2.
[UNIX] Specifically used to describe the state of a TTY left in a
losing state by abort of a screen-oriented program or one that has
messed with the line discipline in some obscure way.
WEEBLE (weeb'l) [Cambridge University] interj. Use to denote
frustration, usually at amazing stupidity. ``I stuck the disk in
upside down.'' ``Weeble...'' Compare GURFLE.
WEEDS n. Refers to development projects or algorithms that have no
possible relevance or practical application. Comes from ``off in
the weeds''. Used in phrases like ``lexical analysis for microcode
is serious weeds...''
WELL BEHAVED adj. Of software: conforming to coding guidelines and
standards. Well behaved software uses the operating system to do
chores such as keyboard input, allocating memory and drawing
graphics. Oppose ILL-BEHAVED.
WETWARE n. 1. The human brain, as opposed to computer hardware or
software (as in ``Wetware has at most 7 +/- 2 registers''). 2.
Human beings (programmers, operators, administrators) attached to a
computer system, as opposed to the system's hardware or software.
WHAT n. The question mark character (``?''). See QUES. Usage: rare,
used particularly in conjunction with WOW.
WHEEL [from Twenex, q.v.] n. A privileged user or WIZARD (sense #2).
Now spreading into the UNIX culture. Privilege bits are sometimes
called WHEEL BITS. The state of being in a privileged logon is
sometimes called WHEEL MODE.
WHEEL WARS [Stanford University] A period in LARVAL STAGE during which
student wheels hack each other by attempting to log each other out
of the system, delete each other's files, or otherwise wreak havoc,
usually at the expense of the lesser users.
WHITE BOOK, THE n. Kernighan & Ritchie's _The_C_Programming_Language_,
esp. the classic and influential first edition. Also called simply
``K&R''. See SILVER BOOK, PURPLE BOOK, ORANGE BOOK.
WIBNI [Bell Labs, Wouldn't It Be Nice If] n. What most requirements
documents/specifications consist entirely of. Compare IWBNI.
WIDGET n. 1. A meta-thing. Used to stand for a real object in
didactic examples (especially database tutorials). Legend has it
that the original widgets were holders for buggy whips. 2. A user
interface object in X Window System GUIs.
WIMP ENVIRONMENT n. [acronymic from Window, Icon, Mouse, Pointer] A
graphical-user-interface based environmend, as described by a hacker
who prefers command-line interfaces for their superior flexibility
and
extensibility.
WIN [from MIT jargon] 1. v. To succeed. A program wins if no
unexpected conditions arise. 2. BIG WIN: n. Serendipity. Emphatic
forms: MOBY WIN, SUPER WIN, HYPER-WIN (often used interjectively as
a reply). For some reason SUITABLE WIN is also common at MIT,
usually in reference to a satisfactory solution to a problem. See
LOSE.
WINNAGE (win'@j) n. The situation when a lossage is corrected, or when
something is winning. Quite rare. Usage: also quite rare.
WINNER 1. n. An unexpectedly good situation, program, programmer or
person. 2. REAL WINNER: Often sarcastic, but also used as high
praise.
WINNITUDE (win'i-tood) n. The quality of winning (as opposed to
WINNAGE, which is the result of winning). ``That's really great!
Boy, what winnitude!''
WIREHEAD n. 1. A hardware hacker, especially one who concentrates on
communications hardware. 2. An expert in local area networks. A
wirehead can be a network software wizard too, but will always have
the ability to deal with network hardware, down to the smallest
component. Wireheads are known for their ability to lash up an
Ethernet terminator from spare resistors, for example.
WIZARD n. 1. A person who knows how a complex piece of software or
hardware works; someone who can find and fix his bugs in an
emergency. Rarely used at MIT, where HACKER is the preferred term.
2. A person who is permitted to do things forbidden to ordinary
people, e.g., a ``net wizard'' on a TENEX may run programs which
speak low-level host-imp protocol; an ADVENT wizard at SAIL may
play Adventure during the day. 3. A UNIX expert. See GURU.
WIZARD MODE [from nethack] n. A special access mode of a program or
system, usually passworded, that permits some users godlike
privileges. Generally not used for operating systems themselves
(ROOT MODE or WHEEL MODE would be used instead).
WOMBAT [Waste Of Money, Brains and Time] adj. Applied to problems
which are both profoundly UNINTERESTING in themselves and unlikely
to benefit anyone interesting even if solved. Often used in
fanciful constructions such as WRESTLING WITH A WOMBAT. See also
CRAWLING HORROR.
WONKY (won'kee) [from Australian slang] adj. Yet another approximate
synonym for BROKEN. Specifically connotes a malfunction which
produces behavior seen as crazy, humorous, or amusingly perverse.
``That was the day the printer's font logic went wonky and
everybody's listings came out in Elvish.'' Also in WONKED OUT. See
FUNKY.
WORM [from `tapeworm' in John Brunner's _Shockwave_Rider_, via XEROX
PARC] n. A cracker program that propagates itself over a network,
reproducing itself as it goes. See `VIRUS'. Perhaps the best known
example was RTM's `Internet Worm' in '87, a `benign' one that got
out of control and shut down hundreds of Suns and VAXen nationwide.
See VIRUS, TROJAN HORSE, ICE.
WOUND AROUND THE AXLE adj. In an infinite loop. Often used by older
computer types, along with ``out in the WEEDS''.
WOW See EXCL.
WRONG THING, THE n. A design, action or decision which is clearly
incorrect or inappropriate. Often capitalized; always emphasized in
speech as if capitalized. Antonym: THE RIGHT THING (q.v.).
WUGGA WUGGA (wuh'guh wuh'guh) n. Imaginary sound that a computer
program makes as it labors with a tedious or difficult task.
Compare CRUNCHA CHRUNCHA CRUNCHA.
= X =
X Used in various speech and writing contexts in roughly its algebraic
sense of ``unknown within a set defined by context'' (compare `N').
Thus: the abbreviation 680x0 stands for 68000, 68010, 68020, 68030
or 68040, and 80x86 stands for 80186, 80286 80386 or 80486 (note
that a UNIX hacker might write these as 680[01234]0 and 80[1234]86
or 680?0 and 80?86 respectively; see GLOB).
XYZZY (exs-wie-zee-zee-wie) [from the ADVENT game] adj. A magic word.
This has actually been implemented as an undocumented no-op command
on several OSs; in Data General's AOS, for example, it would
respond ``Nothing happens.'' just as ADVENT did before a player had
performed the action that enabled the word. See PLUGH.
= Y =
YABA (ya'buh) [Cambridge University] n. Yet Another Bloody Acronym.
Whenever some program is being named, someone invariably suggests
that it be given a name which is acronymic. The response from those
with a trace of originality is to remark ironically that the
proposed name would then be ``YABA-compatible''. Also used in
response to questions like ``What is WYSIWYG?'' ``YABA.'' See also
TLA.
YOW! (yow) [from Zippy the Pinhead comix] interj. Favored hacker
expression of humorous surprise or emphasis. ``Yow! Check out what
happens when you twiddle the foo option on this display hack!''
Compare GURFLE, MUMBLE FROTZ.
YOYO MODE n. State in which the system is said to be when it rapidly
alternates several times between being up and being down.
YU-SHIANG WHOLE FISH (yoo-shyang hohl fish) n. The character gamma
(extended SAIL ASCII 11), which with a loop in its tail looks like
a fish. Usage: used primarily by people on the MIT LISP Machine.
Tends to elicit incredulity from people who hear about it
second-hand.
= Z =
ZEN v. To figure out something by meditation, or by a sudden flash of
enlightenment. Originally applied to bugs, but occasionally applied
to problems of life in general. ``How'd you figure out the buffer
allocation problem?'' ``Oh, I zenned it''. Contrast GROK, which
connotes a time-extended version of zenning a system.
ZERO v. 1. To set to zero. Usually said of small pieces of data, such
as bits or words. 2. To erase; to discard all data from. Said of
disks and directories, where ``zeroing'' need not involve actually
writing zeroes throughout the area being zeroed. See SCRIBBLE.
ZIPPERHEAD [IBM] n. A person with a closed mind.
ZOMBIE [UNIX] n. A process which has been killed but has not yet
relinquished its process table slot. These show up in ps(1)
listings occasionally.
ZORK (zork) n. Second of the great early experiments in computer
fantasy gaming; see ADVENT. Originally written on MIT-DMS during
the late seventies, later distributed with BSD UNIX and
commercialized as ``The Zork Trilogy'' by Infocom.
==================== MAIN TEXT ENDS HERE ===================================
APPENDIX A:
THE UNTIMELY DEMISE OF MABEL THE MONKEY
a cautionary tale
The following, modulo a couple of inserted commas and capitalization
changes for readability, is the exact text of a famous USENET message.
The reader may wish to review the definitions of PM and MOUNT in the main
text before continuing.
Date: Wed 3 Sep 86 16:46:31-EDT
From: "Art Evans" <Evans at TL-20B.ARPA>
Subject: Always Mount a Scratch Monkey
To: Risks at CSL.SRI.COM
My friend Bud used to be the intercept man at a computer vendor for
calls when an irate customer called. Seems one day Bud was sitting at
his desk when the phone rang.
Bud: Hello. Voice: YOU KILLED MABEL!!
B: Excuse me? V: YOU KILLED MABEL!!
This went on for a couple of minutes and Bud was getting nowhere, so he
decided to alter his approach to the customer.
B: HOW DID I KILL MABEL? V: YOU PM'ED MY MACHINE!!
Well, to avoid making a long story even longer, I will abbreviate what had
happened. The customer was a Biologist at the University of Blah-de-blah,
and he had one of our computers that controlled gas mixtures that Mabel (the
monkey) breathed. Now, Mabel was not your ordinary monkey. The University
had spent years teaching Mabel to swim, and they were studying the effects
that different gas mixtures had on her physiology. It turns out that the
repair folks had just gotten a new Calibrated Power Supply (used to
calibrate analog equipment), and at their first opportunity decided to
calibrate the D/A converters in that computer. This changed some of the gas
mixtures and poor Mabel was asphyxiated. Well, Bud then called the branch
manager for the repair folks:
Manager: Hello
B: This is Bud, I heard you did a PM at the University of
Blah-de-blah.
M: Yes, we really performed a complete PM. What can I do
for you?
B: Can you swim?
The moral is, of course, that you should always mount a scratch monkey.
~~~~~~~~~~~~~~~~~~~~~~
There are several morals here related to risks in use of computers.
Examples include, ``If it ain't broken, don't fix it.'' However, the
cautious philosophical approach implied by ``always mount a scratch
monkey'' says a lot that we should keep in mind.
Art Evans
Tartan Labs
APPENDIX B:
OBSOLESCENT TERMS FROM THE JARGON FILE
The following terms appeared in the main listing of the original
Jargon File, but have been rendered obsolescent by the passage of
time, the march of technology, the death of the DEC PDP-10, and the
May 1990 shutdown of the ITS machines. They are collected here for
possible historical interest.
AOS (aus (East coast) ay-ahs (West coast)) [based on a PDP-10
increment instruction] v. To increase the amount of something.
``Aos the campfire.'' Usage: considered silly, and now
obsolescent. See SOS. Now largely supplanted by BUMP.
BIG BLT, THE (big belt, th:) n., obs. Shuffling operation on the
PDP-10 under some operating systems that consumes a significant
amount of computer time. See BLT in the main listing.
BIN (bin) [short for BINARY; used as a second file name on ITS] 1. n.
BINARY. 2. BIN FILE: A file containing the BIN for a program.
Usage: used at MIT, which runs on ITS. The equivalent term at
Stanford was DMP (pronounced ``dump") FILE. Other names used
include SAV ("save") FILE (DEC and Tenex), SHR ("share") and LOW
FILES (DEC), and COM FILES (CP/M), and EXE ("ex'ee") FILE (DEC,
Twenex, MS-DOS, occasionally UNIX). Also in this category are the
input files to the various flavors of linking loaders (LOADER,
LINK-10, STINK), called REL FILES. See EXE in main text.
COM[M] MODE (kom mohd) [from the ITS feature for linking two or more
terminals together so that text typed on any is echoed on all,
providing a means of conversation among hackers; spelled with one
or two Ms] Syn. for TALK MODE in main text.
DIABLO (dee-ah'blow) [from the Diablo printer] 1. n. Any letter-
quality printing device. 2. v. To produce letter-quality output
from such a device. See LASE in main listing.
DMP (dump) See BIN.
DPB (duh-pib') [from the PDP-10 instruction set] v., obs. To plop
something down in the middle.
ENGLISH (ing'lish) n. The source code for a program, which may be in
any language, as opposed to BINARY. Usage: obsolete, used mostly
by old-time hackers, though recognizable in context. On ITS,
directory SYSENG was where the ``English'' for system programs is
kept, and SYSBIN, the binaries. SAIL had many such directories,
but the canonical one is [CSP,SYS].
EXCH (ex'chuh, ekstch) [from the PDP-10 instruction set] v., obs. To
exchange two things, each for the other.
IMPCOM (imp'kahm) See TELNET. This term is now nearly obsolete.
IRP (erp) [from the MIDAS pseudo-op which generates a block of code
repeatedly, substituting in various places the car and/or cdr of
the list(s) supplied at the IRP] v. To perform a series of tasks
repeatedly with a minor substitution each time through. ``I guess
I'll IRP over these homework papers so I can give them some random
grade for this semester.'' Usage: rare, now obsolescent.
JFCL (djif'kl or djafik'l) [based on the PDP-10 instruction that acts
as a fast no-op] v., obs. To cancel or annul something. ``Why
don't you jfcl that out?"
JRST (jerst) [based on the PDP-10 jump instruction] v., obs. To
suddenly change subjects. Usage: rather rare. ``Jack be nimble,
Jack be quick; Jack jrst over the candle stick.''
JSYS (jay'sis), pl. JSI (jay'sigh) [Jump to SYStem] v.,obs. See UUO.
LDB (lid'dib) [from the PDP-10 instruction set] v. To extract from the
middle.
MOBY (moh'bee) n. This term entered the world of AI with the Fabritek
256K moby memory of MIT-AI. Thus, classically, 256K words, the size
of a PDP-10 moby. (The maximum address space means the maximum
normally addressable space, as opposed to the amount of physical
memory a machine can have. Thus the MIT PDP-10s each have two
mobies, usually referred to as the ``low moby'' (0-777777) and
``high moby'' (1000000-1777777), or as ``moby 0'' and ``moby 1''.
MIT-AI had four mobies of address space: moby 2 was the PDP-6
memory, and moby 3 the PDP-11 interface.) In this sense ``moby''
is often used as a generic unit of either address space (18. bits'
worth) or of memory (about a megabyte, or 9/8 megabyte (if one
accounts for difference between 32- and 36-bit words), or 5/4
megacharacters).
PHANTOM (fan'tm) [Stanford] n. The SAIL equivalent of a DRAGON (q.v.).
Typical phantoms include the accounting program, the news-wire
monitor, and the lpt and xgp spoolers. UNIX and most other
environments call this sort of program a background DEMON or
DAEMON.
PPN (pip'in) [DEC terminology, short for Project-Programmer Number] n.
1. A combination `project' (directory name) and programmer name,
used to identify a specific directory belonging to that user. For
instance, ``FOO,BAR'' would be the FOO directory for user BAR.
Since the name is restricted to three letters, the programmer name
is usually the person's initials, though sometimes it is a nickname
or other special sequence. (Standard DEC setup is to have two
octal numbers instead of characters; hence the original acronym.)
2. Often used loosely to refer to the programmer name alone. ``I
want to send you some mail; what's your ppn?'' Usage: not used at
MIT, since ITS does not use ppn's. The equivalent terms would be
UNAME and SNAME, depending on context, but these are not used
except in their technical senses.
REL (rel) See BIN in the main listing. Short for `relocatable', used
on the old TOPS-10 OS.
SAV (sayv) See BIN.
SHR (sheir) See BIN.
SOS 1. (ess-oh-ess) n. A losing editor, SON OF STOPGAP. 2. (sahss) v.
Inverse of AOS, from the PDP-10 instruction set.
STY (pronounced ``stie'', not spelled out) n. A pseudo-teletype, which
is a two-way pipeline with a job on one end and a fake keyboard-tty
on the other. Also, a standard program which provides a pipeline
from its controlling tty to a pseudo-teletype (and thence to
another tty, thereby providing a ``sub-tty"). This is MIT
terminology; the SAIL, DEC and UNIX equivalent is PTY (see main
text).
SUPDUP (soop'doop) v. To communicate with another ARPAnet host using
the SUPDUP program, which is a SUPer-DUPer TELNET talking a special
display protocol used mostly in talking to ITS sites. Sometimes
abbreviated to SD.
TECO (tee'koh) [acronym for Text Editor and COrrector] 1. n. A text
editor developed at MIT, and modified by just about everybody. If
all the dialects are included, TECO might well be the single most
prolific editor in use. Noted for its powerful pseudo-programming
features and its incredibly hairy syntax. 2. v. obs. To edit using
the TECO editor in one of its infinite forms; sometimes used to
mean ``to edit'' even when not using TECO! Usage: rare at SAIL,
where most people wouldn't touch TECO with a TENEX pole.
[Historical note, c. 1982: DEC grabbed an ancient version of MIT
TECO many years ago when it was still a TTY-oriented editor. By
now, TECO at MIT is highly display-oriented and is actually a
language for writing editors, rather than an editor. Meanwhile,
the outside world's various versions of TECO remain almost the same
as the MIT version of the early 1970s. DEC recently tried to
discourage its use, but an underground movement of sorts kept it
alive. -- GLS]
[Since this note was written I found out that DEC tried to force
their hackers by administrative decision to use a hacked up and
generally lobotomized version of SOS instead of TECO, and they
revolted. -- MRC]
[1990 update: TECO is now pretty much one with the dust of history,
having been replaced (both functionally and psychologically) almost
everywhere by GNU EMACS -- ESR]
UUO (yoo-yoo-oh) [short for ``Un-Used Operation"] n. A PDP-10 system
monitor call. The term ``Un-Used Operation'' comes from the fact
that, on PDP-10 systems, monitor calls are implemented as invalid
or illegal machine instructions, which cause traps to the monitor
(see TRAP). The SAIL manual describing the available UUOs has a
cover picture showing an unidentified underwater object. See YOYO.
[Note: DEC sales people have since decided that ``Un-Used
Operation" sounds bad, so UUO now stands for ``Unimplemented User
Operation''.] Tenex and Twenex systems use the JSYS machine
instruction (q.v.), which is halfway between a legal machine
instruction and a UUO, since KA-10 Tenices implement it as a
hardware instruction which can be used as an ordinary subroutine
call (sort of a ``pure JSR").
WORMHOLE (werm'hohl) n. A location in a monitor which contains the
address of a routine, with the specific intent of making it easy to
substitute a different routine. The following quote comes from
``Polymorphic Systems'', vol. 2, p. 54:
``Any type of I/O device can be substituted for the standard device
by loading a simple driver routine for that device and installing
its address in one of the monitor's `wormholes.'* ---------- *The
term `wormhole' has been used to describe a hypothetical
astronomical situation where a black hole connects to the `other
side' of the universe. When this happens, information can pass
through the wormhole, in only one direction, much as `assumptions'
pass down the monitor's wormholes.''
This term is now obsolescent. Modern operating systems use clusters
of wormholes extensively (for modularization of I/O handling in
particular, as in the UNIX device-driver organization) but the
preferred jargon for these clusters is `device tables', `jump
tables' or `capability tables'.
XGP (eks-jee-pee) 1. n. Xerox Graphics Printer. 2. v. To print
something on the XGP. ``You shouldn't XGP such a large file.''
YOYO (yoh'yoh) n. DEC service engineers' slang for UUO (q.v.). Usage:
rare at Stanford and MIT, has been found at random DEC
installations.
APPENDIX C:
FOR FURTHER READING
Here are some other books you can read to help you understand the hacker
mindset.
Godel, Escher, Bach: An Eternal Golden Braid
Hofstadter, Douglas
Basic Books, New York 1979
ISBN 0-394-74502-7
This book reads like an intellectual Grand Tour of hacker
preoccupations. Music, mathematical logic, programming, speculations on
the nature of intelligence, biology, and Zen are woven into a brilliant
tapestry themed on the concept of encoded self-reference. The perfect
left-brain companion to _Illuminatus_.
Illuminatus (three vols)
1. The Golden Apple
2. The Eye in the Pyramid
3. Leviathan
Shea, Robert & Wilson, Robert Anton
Dell Books, New York 1975
ISBN 0-440-{14688-7,34691-6,14742-5}
This work of alleged fiction is an incredible berserko-surrealist
rollercoaster of world-girdling conspiracies, intelligent dolphins,
the fall of Atlantis, who really killed JFK, sex, drugs, rock and roll
and the Cosmic Giggle Factor. First published in 3 volumes, but
there's now a one-volume trade paperback carried by most chain
bookstores under SF. The perfect right-brain companion to Hofstadter's
_Godel_Escher,_Bach:_An_Eternal_Golden_Braid_. See ERIS, DISCORDIANISM,
RANDOM NUMBERS, CHURCH OF THE SUB-GENIUS.
The Hitchhiker's Guide to the Galaxy
Douglas Adams
Pocket Books 1981, New York
ISBN 0-671-46149-4
This Monty-Python-in-Space spoof of SF genre traditions has been
popular among hackers ever since the original British radio show.
Read it if only to learn about Vogons (see BOGONS) and the
significance of the number 42 (see RANDOM NUMBERS) -- also why the
winningest chess program of 1990 was called DEEP THOUGHT.
The Tao of Programming
James Geoffrey
Infobooks 1987, Santa Monica,
ISBN 0-931137-07-1
This gentle, funny spoof of the _Tao_Te_Ching_ contains much that is
illuminating about the hacker way of thought. ``When you have learned
to snatch the error code from the trap frame, it will be time for you
to leave.''
Hackers
Steven Levy
Anchor/Doubleday 1984, New York
ISBN 0-385-19195-2
Levy's book is at its best in describing the early MIT hackers at the
Model Railroad Club and the early days of the microcomputer revolution.
He never understood UNIX or the networks, though, and his enshrinement of
RMS as ``the last hacker'' turns out to have been quite misleading.
The Cuckoo's Egg
Clifford Stoll
Doubleday 1989, New York
ISBN 0-385-24946-2
Clifford Stoll's absorbing tale of how he tracked Marcus Hess and the
Chaos Club cracking-ring nicely illustrates the difference between `hacker'
and `cracker'. And Stoll's portrait of himself and his lady Barbara and his
friends at Berkeley and on the Internet paints a marvelously vivid picture
of how hackers and the people around them like to live and what they think.
======================= END OF THE JARGON FILE ================================
# The following sets edit modes for GNU EMACS
# Local Variables:
# mode:text
# case-fold-search:nil
# fill-prefix:" "
# fill-column:70
# End:
More information about the Comp.unix.internals
mailing list