The Hacker's Dictionary by - (sneezy the snowman read aloud txt) π
But there is more. Hackers, as a rule, love wordplay and are very conscious and inventive in their use of language. These traits seem to be common in young children, but the conformity-enforcing machine we are pleased to call an educational system bludgeons them out of most of us before adolescence. Thus, linguistic invention in most subcultures of the modern West is a halting and largely unconscious process. Hackers, by contrast, regard slang formation and use as a game to be played for conscious pleasure. Their inventions thus display an almost unique combination of the neotenous enjoyment of language-play with the discrimination of educated and powerful intelligence. Further, the electronic media which knit them together are fluid, `hot' connections, well adapted to both the dissemination of new slang and the ruthless culling of weak and superannuated specimens. The results of this process give us perhaps a uniquely inten
Read free book Β«The Hacker's Dictionary by - (sneezy the snowman read aloud txt) πΒ» - read online or download for free at americanlibrarybooks.com
- Author: -
- Performer: 0262680920
Read book online Β«The Hacker's Dictionary by - (sneezy the snowman read aloud txt) πΒ». Author - -
:HP-SUX: /H-P suhks/ n. Unflattering hackerism for HP-UX, Hewlett-Packard's UNIX port, which eatures some truly unique bogosities in the filesystem internals and elsewhere (these occasionally create portability problems). HP-UX is often referred to as `hockey-pux'
inside HP, and one respondent claims that the proper pronunciation is /H-P ukkkhhhh/ as though one were about to spit. Another such alternate spelling and pronunciation is "H-PUX" /H-puhks/.
Hackers at HP/Apollo (the former Apollo Computers which was swallowed by HP in 1989) have been heard to complain that Mr. Packard should have pushed to have his name first, if for no other reason than the greater eloquence of the resulting acronym.
Compare {AIDX}, {buglix}. See also {Nominal Semidestructor}, {Telerat}, {Open DeathTrap}, {ScumOS}, {sun-stools}, {terminak}.
:huff: v. To compress data using a Huffman code. Various programs that use such methods have been called `HUFF' or some variant thereof. Oppose {puff}. Compare {crunch}, {compress}.
:humma: // excl. A filler word used on various chat' andtalk' programs when you had nothing to say but felt that it was important to say something. The word apparently originated (at least with this definition) on the MECC Timeshare System (MTS, a now-defunct educational time-sharing system running in Minnesota during the 1970s and the early 1980s) but was later sighted on early UNIX systems.
:Humor, Hacker:: n. A distinctive style of shared intellectual humor found among hackers, having the following marked characteristics:
Fascination with form-vs.-content jokes, paradoxes, and humor having to do with confusion of metalevels (see {meta}). One way to make a hacker laugh: hold a red index card in front of him/her with "GREEN" written on it, or vice-versa (note, however, that this is funny only the first time).
Elaborate deadpan parodies of large intellectual constructs, such as specifications (see {write-only memory}), standards documents, language descriptions (see {INTERCAL}), and even entire scientific theories (see {quantum bogodynamics}, {computron}).
Jokes that involve screwily precise reasoning from bizarre, ludicrous, or just grossly counter-intuitive premises.
Fascination with puns and wordplay.
A fondness for apparently mindless humor with subversive currents of intelligence in it --- for example, old Warner Brothers and Rocky & Bullwinkle cartoons, the Marx brothers, the early B-52s, and Monty Python's Flying Circus. Humor that combines this trait with elements of high camp and slapstick is especially favored.
References to the symbol-object antinomies and associated ideas in Zen Buddhism and (less often) Taoism. See {has the X nature}, {Discordianism}, {zen}, {ha ha only serious}, {AI koans}.
See also {filk}, {retrocomputing}, and {appendix B}. If you have an itchy feeling that all 6 of these traits are really aspects of one thing that is incredibly difficult to talk about exactly, you are (a) correct and (b) responding like a hacker. These traits are also recognizable (though in a less marked form) throughout {{science-fiction fandom}}.
:hung: [from `hung up'] adj. Equivalent to {wedged}, but more common at UNIX/C sites. Not generally used of people. Syn. with {locked up}, {wedged}; compare {hosed}. See also {hang}.
A hung state is distinguished from {crash}ed or {down}, where the program or system is also unusable but because it is not running rather than because it is waiting for something. However, the recovery from both situations is often the same.
:hungry puppy: n. Syn. {slopsucker}.
:hungus: /huhng'g*s/ [perhaps related to slang `humongous'] adj.
Large, unwieldy, usually unmanageable. "TCP is a hungus piece of code." "This is a hungus set of modifications."
:hyperspace: /hi:'per-spays/ n. A memory location that is far
away from where the program counter should be pointing, often inaccessible because it is not even mapped in. "Another core dump --- looks like the program jumped off to hyperspace somehow." (Compare {jump off into never-never land}.) This usage is from the SF notion of a spaceship jumping into hyperspace', that is, taking a shortcut through higher-dimensional space --- in other words, bypassing this universe. The varianteast hyperspace' is recorded among CMU and Bliss hackers.
= I =
=====
:I didn't change anything!: interj. An aggrieved cry often heard as bugs manifest during a regression test. The {canonical} reply to this assertion is "Then it works just the same as it did before, doesn't it?" See also {one-line fix}. This is also heard from applications programmers trying to blame an obvious applications problem on an unrelated systems software change, for example a divide-by-0 fault after terminals were added to a network.
Usually, their statement is found to be false. Upon close questioning, they will admit some major restructuring of the program that shouldn't have broken anything, in their opinion, but which actually {hosed} the code completely.
:I see no X here.: Hackers (and the interactive computer games they write) traditionally favor this slightly marked usage over other possible equivalents such as "There's no X here!" or "X is missing." or "Where's the X?". This goes back to the original PDP-10 {ADVENT}, which would respond in this wise if you asked it to do something involving an object not present at your location in the game.
:i14y: // n. Abbrev. for interoperability', with the14'
replacing fourteen letters. Used in the {X} (windows) community. Refers to portability and compatibility of data formats (even binary ones) between different programs or implementations of the same program on different machines.
:i18n: // n. Abbrev. for `internationali{z,s}ation', with the 18
replacing 18 letters. Used in the {X} (windows) community.
:IBM: /I-B-M/ Inferior But Marketable; It's Better Manually; Insidious Black Magic; It's Been Malfunctioning; Incontinent Bowel Movement; and a near-{infinite} number of even less complimentary expansions, including International Business Machines'. See {TLA}. These abbreviations illustrate the considerable antipathy most hackers have long felt toward theindustry leader'
(see {fear and loathing}).
What galls hackers about most IBM machines above the PC level isn't so much that they are underpowered and overpriced (though that does count against them), but that the designs are incredibly archaic, {crufty}, and {elephantine} ... and you can't fix them --- source code is locked up tight, and programming tools are expensive, hard to find, and bletcherous to use once you've found them. With the release of the UNIX-based RIOS family this may have begun to change --- but then, we thought that when the PC-RT came out, too.
In the spirit of universal peace and brotherhood, this lexicon now includes a number of entries attributed to `IBM'; these derive from some rampantly unofficial jargon lists circulated within IBM's own beleaguered hacker underground.
:IBM discount: n. A price increase. Outside IBM, this derives from the common perception that IBM products are generally overpriced (see {clone}); inside, it is said to spring from a belief that large numbers of IBM employees living in an area cause prices to rise.
:ICBM address: n. (Also `missile address') The form used to register a site with the USENET mapping project includes a blank for longitude and latitude, preferably to seconds-of-arc accuracy.
This is actually used for generating geographically-correct maps of USENET links on a plotter; however, it has become traditional to refer to this as one's ICBM address' ormissile address', and many people include it in their {sig block} with that name.
:ice: [coined by USENETter Tom Maddox, popularized by William Gibson's cyberpunk SF novels: a contrived acronym for Intrusion Countermeasure Electronics'] Security software (in Gibson's novels, software that responds to intrusion by attempting to literally kill the intruder). Also,icebreaker': a program designed for cracking security on a system. Neither term is in serious use yet as of mid-1991, but many hackers find the metaphor attractive, and each may develop a denotation in the future.
:idempotent: [from mathematical techspeak] adj. Acting exactly once. This term is often used with respect to {C} header files, which contain common definitions and declarations to be included by several source files. If a header file is ever included twice during the same compilation (perhaps due to nested #include files), compilation errors can result unless the header file has protected itself against multiple inclusion; a header file so protected is said to be idempotent. The term can also be used to describe an initialization subroutine which is arranged to perform some critical action exactly once, even if the routine is called several times.
:If you want X, you know where to find it.: There is a legend that Dennis Ritchie, inventor of {C}, once responded to demands for features resembling those of what at the time was a much more popular language by observing "If you want PL/1, you know where to find it." Ever since, this has been hackish standard form for fending off requests to alter a new design to mimic some older (and, by implication, inferior and {baroque}) one. The case X =
{Pascal} manifests semi-regularly on USENET's comp.lang.c newsgroup. Indeed, the case X = X has been reported in discussions of graphics software (see {X}).
:ifdef out: /if'def owt/ v. Syn. for {condition out}, specific to {C}.
:ill-behaved: adj. 1. [numerical analysis] Said of an algorithm or computational method that tends to blow up because of accumulated roundoff error or poor convergence properties. 2. Software that bypasses the defined {OS} interfaces to do things (like screen, keyboard, and disk I/O) itself, often in a way that depends on the hardware of
Comments (0)