Are you over 18 and want to see adult content?
More Annotations
A complete backup of www.bbc.co.uk/sport/football/51532949
Are you over 18 and want to see adult content?
A complete backup of www.washingtonpost.com/national/2-rhode-island-virus-cases-stem-from-same-europe-school-trip/2020/03/02/e09
Are you over 18 and want to see adult content?
A complete backup of www.mk.co.kr/news/economy/view/2020/03/217122/
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of tophealthytrials.com
Are you over 18 and want to see adult content?
A complete backup of libertynation.com
Are you over 18 and want to see adult content?
A complete backup of whitsamusebouche.com
Are you over 18 and want to see adult content?
Text
IT
CRACKERS - OUTPOST9
dictbig.zip : Large word dictionary 322K Unzipped: norm&r.zip: Same as dictbig.zip + all entries reversed 644K Unzipped: oneup&r.zip: Same as norm&r.zip with first leter uppercase THE NEW HACKER'S DICTIONARY The `hacker culture' is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who definethemselves
THE NEW HACKER'S DICTIONARY The New Hacker's Dictionary . Introduction. Of Slang, Jargon, and Techspeak; Revision History. How Jargon Works. Jargon Construction. Verb Doubling; Soundalike slang THE NEW HACKER'S DICTIONARY Go to the previous, next section. = W = wabbit /wab'it/ /n./ 1. A legendary early hack reported on a System/360 at RPI and elsewhere around 1978; this may have descended (if only by inspiration) from a hack called RABBITS reported from 1969 on a Burroughs 5500 at the University of Washington Computer Center. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Revision History The original Jargon File was a collection of hacker jargon from technical cultures including the MIT AI Lab, the Stanford AI lab (SAIL), and others of the old ARPANET AI/LISP/PDP-10 communities including Bolt, Beranek and Newman (BBN), Carnegie-Mellon University (CMU), and Worcester Polytechnic Institute (WPI). THE NEW HACKER'S DICTIONARY Go to the previous, next section. = P = P-mail /n./. Physical mail, as opposed to email.Synonymous with snail-mail, but much less common.. P.O.D. /P-O-D/ Acronym for `Piece Of Data' (as opposed to a code section). Usage: pedantic and rare. THE NEW HACKER'S DICTIONARY Jargon Construction. There are some standard methods of jargonification that became established quite early (i.e., before 1970), spreading from such sources as the Tech Model Railroad Club, the PDP-1 SPACEWAR hackers, and John McCarthy's original crew of LISPers. These include verb doubling, soundalike slang, the `-P'convention
THE NEW HACKER'S DICTIONARY user-friendly /adj./. Programmer-hostile. Generally used by hackers in a critical tone, to describe systems that hold the user's hand so obsessively that they make it painful for the more experienced and knowledgeable to get any work done. See menuitis, drool-proof paper, Macintrash , user-obsequious. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = G = G /pref.,suff./ See quantifiers.. g-file /n./ Any file that is written with the intention of being read by a human rather than a machine, such as the Jargon File, documentation, humor files, hacker lore, and technical materials. OUTPOST9.COMWORD LISTSSECURITY / HACKINGTHE LAB Outpost9. Computer Consulting and Management Services Providing Consulting, Installation, Repair, Engineering, and Management of yourIT
CRACKERS - OUTPOST9
dictbig.zip : Large word dictionary 322K Unzipped: norm&r.zip: Same as dictbig.zip + all entries reversed 644K Unzipped: oneup&r.zip: Same as norm&r.zip with first leter uppercase THE NEW HACKER'S DICTIONARY The `hacker culture' is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who definethemselves
THE NEW HACKER'S DICTIONARY The New Hacker's Dictionary . Introduction. Of Slang, Jargon, and Techspeak; Revision History. How Jargon Works. Jargon Construction. Verb Doubling; Soundalike slang THE NEW HACKER'S DICTIONARY Go to the previous, next section. = W = wabbit /wab'it/ /n./ 1. A legendary early hack reported on a System/360 at RPI and elsewhere around 1978; this may have descended (if only by inspiration) from a hack called RABBITS reported from 1969 on a Burroughs 5500 at the University of Washington Computer Center. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Revision History The original Jargon File was a collection of hacker jargon from technical cultures including the MIT AI Lab, the Stanford AI lab (SAIL), and others of the old ARPANET AI/LISP/PDP-10 communities including Bolt, Beranek and Newman (BBN), Carnegie-Mellon University (CMU), and Worcester Polytechnic Institute (WPI). THE NEW HACKER'S DICTIONARY Go to the previous, next section. = P = P-mail /n./. Physical mail, as opposed to email.Synonymous with snail-mail, but much less common.. P.O.D. /P-O-D/ Acronym for `Piece Of Data' (as opposed to a code section). Usage: pedantic and rare. THE NEW HACKER'S DICTIONARY Jargon Construction. There are some standard methods of jargonification that became established quite early (i.e., before 1970), spreading from such sources as the Tech Model Railroad Club, the PDP-1 SPACEWAR hackers, and John McCarthy's original crew of LISPers. These include verb doubling, soundalike slang, the `-P'convention
THE NEW HACKER'S DICTIONARY user-friendly /adj./. Programmer-hostile. Generally used by hackers in a critical tone, to describe systems that hold the user's hand so obsessively that they make it painful for the more experienced and knowledgeable to get any work done. See menuitis, drool-proof paper, Macintrash , user-obsequious. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = G = G /pref.,suff./ See quantifiers.. g-file /n./ Any file that is written with the intention of being read by a human rather than a machine, such as the Jargon File, documentation, humor files, hacker lore, and technical materials. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Pronunciation Guide Pronunciation keys are provided in the jargon listings for all entries that are neither dictionary words pronounced as in standard English nor obviouscompounds thereof.
THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Hacker Speech Style Hackish speech generally features extremely precise diction, careful word choice, a relatively large working vocabulary, and relatively little use of contractions or street slang. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = A = abbrev /*-breev'/, /*-brev'/ /n./. Common abbreviation for `abbreviation'. ABEND /a'bend/, /*-bend'/ /n./ [ABnormal END THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Crackers, Phreaks, and Lamers From the late 1980s onward, a flourishing culture of local, MS-DOS-basedbulletin boards
ALT.2600 / #HACK FAQ The two types of satellite television networks currently available in the United States are C-Band and Ku-Band. Ku-Band is better known as DSS (Digital Satellite System). C-Band requires a minimum 6' dish, however it also gives you access to thousands of channels from 24 satellites. Ku-Band requires only an 18" dish and gives you access toa
THE NEW HACKER'S DICTIONARY fence /n./. 1. A sequence of one or more distinguished ( out-of-band) characters (or other data items), used to delimit a piece of data intended to be treated as a unit (the computer-science literature calls this a `sentinel'). The NUL (ASCII 0000000) character that terminates strings in C is a fence. THE NEW HACKER'S DICTIONARY n. Anyone who is not a hacker (or, sometimes, anyone not known to the hacker speaking); the noun form of sense 2. "I went to the talk, but the audience was full of randoms asking bogus questions". 10. /n./ (occasional MIT usage) One who lives at Random Hall. See also J. Random, some random X. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = V = V7 /V'sev'en/ /n./. See Version 7.. vadding /vad'ing/ /n./ A leisure-time activity of certain hackers involving the covert exploration of the `secret' parts of large buildings -- basements, roofs, freight elevators THE NEW HACKER'S DICTIONARY Go to the previous, next section. = H = h A method of `marking' common words, i.e., calling attention to the fact that they are being used in a nonstandard, ironic, or humorous way. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = O = Ob-/ob/ /pref./ Obligatory. A piece of netiquette acknowledging that the author has been straying from the newsgroup's charter topic. For example, if a posting in alt.sex is a response to a part of someone else's posting that has nothing particularly to do with sex, the author may append `ObSex' (or `Obsex') and toss off a question or vignette about some OUTPOST9.COMWORD LISTSSECURITY / HACKINGTHE LAB Outpost9. Computer Consulting and Management Services Providing Consulting, Installation, Repair, Engineering, and Management of yourIT
CRACKERS - OUTPOST9
dictbig.zip : Large word dictionary 322K Unzipped: norm&r.zip: Same as dictbig.zip + all entries reversed 644K Unzipped: oneup&r.zip: Same as norm&r.zip with first leter uppercase THE NEW HACKER'S DICTIONARY The `hacker culture' is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who definethemselves
THE NEW HACKER'S DICTIONARY Go to the previous, next section. = W = wabbit /wab'it/ /n./ 1. A legendary early hack reported on a System/360 at RPI and elsewhere around 1978; this may have descended (if only by inspiration) from a hack called RABBITS reported from 1969 on a Burroughs 5500 at the University of Washington Computer Center. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = X = X /X/ /n./. 1. Used in various speech and writing contexts (also in lowercase) in roughly its algebraic sense of `unknown within a set defined by context' (compare N).Thus, the abbreviation 680x0 stands for 68000, 68010, 68020, 68030, or 68040, and 80x86 stands for 80186, 80286 80386 or 80486 (note that a Unix hacker might write these as 6800 and 80 THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Pronunciation Guide Pronunciation keys are provided in the jargon listings for all entries that are neither dictionary words pronounced as in standard English nor obviouscompounds thereof.
THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Jargon Construction There are some standard methods of jargonification that became established quite early (i.e., before 1970), spreading from such sources as the Tech Model Railroad Club, the PDP-1 SPACEWAR hackers, and THE NEW HACKER'S DICTIONARY Go to the previous, next section. = P = P-mail /n./. Physical mail, as opposed to email.Synonymous with snail-mail, but much less common.. P.O.D. /P-O-D/ Acronym for `Piece Of Data' (as opposed to a code section). Usage: pedantic and rare. THE NEW HACKER'S DICTIONARY user-friendly /adj./. Programmer-hostile. Generally used by hackers in a critical tone, to describe systems that hold the user's hand so obsessively that they make it painful for the more experienced and knowledgeable to get any work done. See menuitis, drool-proof paper, Macintrash , user-obsequious. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Email Quotes and Inclusion Conventions One area where conventions for on-line writing are still in some flux is the marking of included material from earlier messages -- what would be called `block quotations' in ordinary English. OUTPOST9.COMWORD LISTSSECURITY / HACKINGTHE LAB Outpost9. Computer Consulting and Management Services Providing Consulting, Installation, Repair, Engineering, and Management of yourIT
CRACKERS - OUTPOST9
dictbig.zip : Large word dictionary 322K Unzipped: norm&r.zip: Same as dictbig.zip + all entries reversed 644K Unzipped: oneup&r.zip: Same as norm&r.zip with first leter uppercase THE NEW HACKER'S DICTIONARY The `hacker culture' is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who definethemselves
THE NEW HACKER'S DICTIONARY Go to the previous, next section. = W = wabbit /wab'it/ /n./ 1. A legendary early hack reported on a System/360 at RPI and elsewhere around 1978; this may have descended (if only by inspiration) from a hack called RABBITS reported from 1969 on a Burroughs 5500 at the University of Washington Computer Center. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = X = X /X/ /n./. 1. Used in various speech and writing contexts (also in lowercase) in roughly its algebraic sense of `unknown within a set defined by context' (compare N).Thus, the abbreviation 680x0 stands for 68000, 68010, 68020, 68030, or 68040, and 80x86 stands for 80186, 80286 80386 or 80486 (note that a Unix hacker might write these as 6800 and 80 THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Pronunciation Guide Pronunciation keys are provided in the jargon listings for all entries that are neither dictionary words pronounced as in standard English nor obviouscompounds thereof.
THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Jargon Construction There are some standard methods of jargonification that became established quite early (i.e., before 1970), spreading from such sources as the Tech Model Railroad Club, the PDP-1 SPACEWAR hackers, and THE NEW HACKER'S DICTIONARY Go to the previous, next section. = P = P-mail /n./. Physical mail, as opposed to email.Synonymous with snail-mail, but much less common.. P.O.D. /P-O-D/ Acronym for `Piece Of Data' (as opposed to a code section). Usage: pedantic and rare. THE NEW HACKER'S DICTIONARY user-friendly /adj./. Programmer-hostile. Generally used by hackers in a critical tone, to describe systems that hold the user's hand so obsessively that they make it painful for the more experienced and knowledgeable to get any work done. See menuitis, drool-proof paper, Macintrash , user-obsequious. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Email Quotes and Inclusion Conventions One area where conventions for on-line writing are still in some flux is the marking of included material from earlier messages -- what would be called `block quotations' in ordinary English. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Revision History The original Jargon File was a collection of hacker jargon from technical cultures including the MIT AI Lab, the Stanford AI lab (SAIL), and others of the old ARPANET AI/LISP/PDP-10 communities including Bolt, Beranek and Newman (BBN), Carnegie-Mellon University (CMU), and Worcester Polytechnic Institute (WPI). THE NEW HACKER'S DICTIONARY The correct size is 1440 KB, that is, 1440 * 1024 = 1474560 bytes. So the `mega' in `1.44 MB' is compounded of two `kilos', one of which is 1024 and the other of which is 1000. The correct number of megabytes would of course be 1440 / 1024 = 1.40625. Alas, this THE NEW HACKER'S DICTIONARY Go to the previous, next section. = O = Ob-/ob/ /pref./ Obligatory. A piece of netiquette acknowledging that the author has been straying from the newsgroup's charter topic. For example, if a posting in alt.sex is a response to a part of someone else's posting that has nothing particularly to do with sex, the author may append `ObSex' (or `Obsex') and toss off a question or vignette about some THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Hacker Speech Style Hackish speech generally features extremely precise diction, careful word choice, a relatively large working vocabulary, and relatively little use of contractions or street slang. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = K = K /K/ /n./ A kilobyte.Used both as a spoken word and a written suffix (like meg and gig for megabyte and gigabyte). See quantifiers.. K&R /n./. Brian Kernighan and Dennis Ritchie's book "The C Programming Language", esp. the classic and influential first edition (Prentice-Hall 1978; ISBN 0-113-110163-3). THE NEW HACKER'S DICTIONARY Go to the previous, next section. = G = G /pref.,suff./ See quantifiers.. g-file /n./ Any file that is written with the intention of being read by a human rather than a machine, such as the Jargon File, documentation, humor files, hacker lore, and technical materials. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = Z = zap. 1. /n./ Spiciness. 2. /vt./ To make food spicy. 3. /vt./ To make someone `suffer' by making his food spicy. (Most hackers love spicy food. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Crackers, Phreaks, and Lamers From the late 1980s onward, a flourishing culture of local, MS-DOS-basedbulletin boards
THE NEW HACKER'S DICTIONARY Go to the previous, next section. = H = h A method of `marking' common words, i.e., calling attention to the fact that they are being used in a nonstandard, ironic, or humorous way. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Personality Characteristics The most obvious common `personality' characteristics of hackers are high intelligence, consuming OUTPOST9.COMWORD LISTSSECURITY / HACKINGTHE LAB Outpost9. Computer Consulting and Management Services Providing Consulting, Installation, Repair, Engineering, and Management of yourIT
CRACKERS - OUTPOST9
dictbig.zip : Large word dictionary 322K Unzipped: norm&r.zip: Same as dictbig.zip + all entries reversed 644K Unzipped: oneup&r.zip: Same as norm&r.zip with first leter uppercase THE NEW HACKER'S DICTIONARY The `hacker culture' is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who definethemselves
THE NEW HACKER'S DICTIONARY Go to the previous, next section. = W = wabbit /wab'it/ /n./ 1. A legendary early hack reported on a System/360 at RPI and elsewhere around 1978; this may have descended (if only by inspiration) from a hack called RABBITS reported from 1969 on a Burroughs 5500 at the University of Washington Computer Center. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = X = X /X/ /n./. 1. Used in various speech and writing contexts (also in lowercase) in roughly its algebraic sense of `unknown within a set defined by context' (compare N).Thus, the abbreviation 680x0 stands for 68000, 68010, 68020, 68030, or 68040, and 80x86 stands for 80186, 80286 80386 or 80486 (note that a Unix hacker might write these as 6800 and 80 THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Pronunciation Guide Pronunciation keys are provided in the jargon listings for all entries that are neither dictionary words pronounced as in standard English nor obviouscompounds thereof.
THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Jargon Construction There are some standard methods of jargonification that became established quite early (i.e., before 1970), spreading from such sources as the Tech Model Railroad Club, the PDP-1 SPACEWAR hackers, and THE NEW HACKER'S DICTIONARY Go to the previous, next section. = P = P-mail /n./. Physical mail, as opposed to email.Synonymous with snail-mail, but much less common.. P.O.D. /P-O-D/ Acronym for `Piece Of Data' (as opposed to a code section). Usage: pedantic and rare. THE NEW HACKER'S DICTIONARY user-friendly /adj./. Programmer-hostile. Generally used by hackers in a critical tone, to describe systems that hold the user's hand so obsessively that they make it painful for the more experienced and knowledgeable to get any work done. See menuitis, drool-proof paper, Macintrash , user-obsequious. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Email Quotes and Inclusion Conventions One area where conventions for on-line writing are still in some flux is the marking of included material from earlier messages -- what would be called `block quotations' in ordinary English. OUTPOST9.COMWORD LISTSSECURITY / HACKINGTHE LAB Outpost9. Computer Consulting and Management Services Providing Consulting, Installation, Repair, Engineering, and Management of yourIT
CRACKERS - OUTPOST9
dictbig.zip : Large word dictionary 322K Unzipped: norm&r.zip: Same as dictbig.zip + all entries reversed 644K Unzipped: oneup&r.zip: Same as norm&r.zip with first leter uppercase THE NEW HACKER'S DICTIONARY The `hacker culture' is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who definethemselves
THE NEW HACKER'S DICTIONARY Go to the previous, next section. = W = wabbit /wab'it/ /n./ 1. A legendary early hack reported on a System/360 at RPI and elsewhere around 1978; this may have descended (if only by inspiration) from a hack called RABBITS reported from 1969 on a Burroughs 5500 at the University of Washington Computer Center. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = X = X /X/ /n./. 1. Used in various speech and writing contexts (also in lowercase) in roughly its algebraic sense of `unknown within a set defined by context' (compare N).Thus, the abbreviation 680x0 stands for 68000, 68010, 68020, 68030, or 68040, and 80x86 stands for 80186, 80286 80386 or 80486 (note that a Unix hacker might write these as 6800 and 80 THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Pronunciation Guide Pronunciation keys are provided in the jargon listings for all entries that are neither dictionary words pronounced as in standard English nor obviouscompounds thereof.
THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Jargon Construction There are some standard methods of jargonification that became established quite early (i.e., before 1970), spreading from such sources as the Tech Model Railroad Club, the PDP-1 SPACEWAR hackers, and THE NEW HACKER'S DICTIONARY Go to the previous, next section. = P = P-mail /n./. Physical mail, as opposed to email.Synonymous with snail-mail, but much less common.. P.O.D. /P-O-D/ Acronym for `Piece Of Data' (as opposed to a code section). Usage: pedantic and rare. THE NEW HACKER'S DICTIONARY user-friendly /adj./. Programmer-hostile. Generally used by hackers in a critical tone, to describe systems that hold the user's hand so obsessively that they make it painful for the more experienced and knowledgeable to get any work done. See menuitis, drool-proof paper, Macintrash , user-obsequious. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Email Quotes and Inclusion Conventions One area where conventions for on-line writing are still in some flux is the marking of included material from earlier messages -- what would be called `block quotations' in ordinary English. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Revision History The original Jargon File was a collection of hacker jargon from technical cultures including the MIT AI Lab, the Stanford AI lab (SAIL), and others of the old ARPANET AI/LISP/PDP-10 communities including Bolt, Beranek and Newman (BBN), Carnegie-Mellon University (CMU), and Worcester Polytechnic Institute (WPI). THE NEW HACKER'S DICTIONARY The correct size is 1440 KB, that is, 1440 * 1024 = 1474560 bytes. So the `mega' in `1.44 MB' is compounded of two `kilos', one of which is 1024 and the other of which is 1000. The correct number of megabytes would of course be 1440 / 1024 = 1.40625. Alas, this THE NEW HACKER'S DICTIONARY Go to the previous, next section. = O = Ob-/ob/ /pref./ Obligatory. A piece of netiquette acknowledging that the author has been straying from the newsgroup's charter topic. For example, if a posting in alt.sex is a response to a part of someone else's posting that has nothing particularly to do with sex, the author may append `ObSex' (or `Obsex') and toss off a question or vignette about some THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Hacker Speech Style Hackish speech generally features extremely precise diction, careful word choice, a relatively large working vocabulary, and relatively little use of contractions or street slang. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = K = K /K/ /n./ A kilobyte.Used both as a spoken word and a written suffix (like meg and gig for megabyte and gigabyte). See quantifiers.. K&R /n./. Brian Kernighan and Dennis Ritchie's book "The C Programming Language", esp. the classic and influential first edition (Prentice-Hall 1978; ISBN 0-113-110163-3). THE NEW HACKER'S DICTIONARY Go to the previous, next section. = G = G /pref.,suff./ See quantifiers.. g-file /n./ Any file that is written with the intention of being read by a human rather than a machine, such as the Jargon File, documentation, humor files, hacker lore, and technical materials. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = Z = zap. 1. /n./ Spiciness. 2. /vt./ To make food spicy. 3. /vt./ To make someone `suffer' by making his food spicy. (Most hackers love spicy food. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Crackers, Phreaks, and Lamers From the late 1980s onward, a flourishing culture of local, MS-DOS-basedbulletin boards
THE NEW HACKER'S DICTIONARY Go to the previous, next section. = H = h A method of `marking' common words, i.e., calling attention to the fact that they are being used in a nonstandard, ironic, or humorous way. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Personality Characteristics The most obvious common `personality' characteristics of hackers are high intelligence, consuming OUTPOST9.COMWORD LISTSPYROTECHNICSSECURITY / HACKINGTHE LAB Outpost9. Computer Consulting and Management Services Providing Consulting, Installation, Repair, Engineering, and Management of yourIT
CRACKERS - OUTPOST9
dictbig.zip : Large word dictionary 322K Unzipped: norm&r.zip: Same as dictbig.zip + all entries reversed 644K Unzipped: oneup&r.zip: Same as norm&r.zip with first leter uppercase THE NEW HACKER'S DICTIONARY The `hacker culture' is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who definethemselves
THE NEW HACKER'S DICTIONARY Go to the previous, next section. = P = P-mail /n./. Physical mail, as opposed to email.Synonymous with snail-mail, but much less common.. P.O.D. /P-O-D/ Acronym for `Piece Of Data' (as opposed to a code section). Usage: pedantic and rare. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Revision History The original Jargon File was a collection of hacker jargon from technical cultures including the MIT AI Lab, the Stanford AI lab (SAIL), and others of the old ARPANET AI/LISP/PDP-10 communities including Bolt, Beranek and Newman (BBN), Carnegie-Mellon University (CMU), and Worcester Polytechnic Institute (WPI). THE NEW HACKER'S DICTIONARY The New Hacker's Dictionary . Introduction. Of Slang, Jargon, and Techspeak; Revision History. How Jargon Works. Jargon Construction. Verb Doubling; Soundalike slang THE NEW HACKER'S DICTIONARY Go to the previous, next section. = W = wabbit /wab'it/ /n./ 1. A legendary early hack reported on a System/360 at RPI and elsewhere around 1978; this may have descended (if only by inspiration) from a hack called RABBITS reported from 1969 on a Burroughs 5500 at the University of Washington Computer Center. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Crackers, Phreaks, and Lamers From the late 1980s onward, a flourishing culture of local, MS-DOS-basedbulletin boards
THE NEW HACKER'S DICTIONARY user-friendly /adj./. Programmer-hostile. Generally used by hackers in a critical tone, to describe systems that hold the user's hand so obsessively that they make it painful for the more experienced and knowledgeable to get any work done. See menuitis, drool-proof paper, Macintrash , user-obsequious. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = G = G /pref.,suff./ See quantifiers.. g-file /n./ Any file that is written with the intention of being read by a human rather than a machine, such as the Jargon File, documentation, humor files, hacker lore, and technical materials. OUTPOST9.COMWORD LISTSPYROTECHNICSSECURITY / HACKINGTHE LAB Outpost9. Computer Consulting and Management Services Providing Consulting, Installation, Repair, Engineering, and Management of yourIT
CRACKERS - OUTPOST9
dictbig.zip : Large word dictionary 322K Unzipped: norm&r.zip: Same as dictbig.zip + all entries reversed 644K Unzipped: oneup&r.zip: Same as norm&r.zip with first leter uppercase THE NEW HACKER'S DICTIONARY The `hacker culture' is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who definethemselves
THE NEW HACKER'S DICTIONARY Go to the previous, next section. = P = P-mail /n./. Physical mail, as opposed to email.Synonymous with snail-mail, but much less common.. P.O.D. /P-O-D/ Acronym for `Piece Of Data' (as opposed to a code section). Usage: pedantic and rare. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Revision History The original Jargon File was a collection of hacker jargon from technical cultures including the MIT AI Lab, the Stanford AI lab (SAIL), and others of the old ARPANET AI/LISP/PDP-10 communities including Bolt, Beranek and Newman (BBN), Carnegie-Mellon University (CMU), and Worcester Polytechnic Institute (WPI). THE NEW HACKER'S DICTIONARY The New Hacker's Dictionary . Introduction. Of Slang, Jargon, and Techspeak; Revision History. How Jargon Works. Jargon Construction. Verb Doubling; Soundalike slang THE NEW HACKER'S DICTIONARY Go to the previous, next section. = W = wabbit /wab'it/ /n./ 1. A legendary early hack reported on a System/360 at RPI and elsewhere around 1978; this may have descended (if only by inspiration) from a hack called RABBITS reported from 1969 on a Burroughs 5500 at the University of Washington Computer Center. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Crackers, Phreaks, and Lamers From the late 1980s onward, a flourishing culture of local, MS-DOS-basedbulletin boards
THE NEW HACKER'S DICTIONARY user-friendly /adj./. Programmer-hostile. Generally used by hackers in a critical tone, to describe systems that hold the user's hand so obsessively that they make it painful for the more experienced and knowledgeable to get any work done. See menuitis, drool-proof paper, Macintrash , user-obsequious. THE NEW HACKER'S DICTIONARY Go to the previous, next section. = G = G /pref.,suff./ See quantifiers.. g-file /n./ Any file that is written with the intention of being read by a human rather than a machine, such as the Jargon File, documentation, humor files, hacker lore, and technical materials.CRACKERS - OUTPOST9
dictbig.zip : Large word dictionary 322K Unzipped: norm&r.zip: Same as dictbig.zip + all entries reversed 644K Unzipped: oneup&r.zip: Same as norm&r.zip with first leter uppercaseOUTPOST9.COM
Latest News. Pyrotechnic forum added 03/24/04. Electronic forum and Spy forum added 03/24/04. Alerts: Outpost9.com is about to undergosome major changes.
THE NEW HACKER'S DICTIONARY Go to the previous, next section.. Pronunciation Guide Pronunciation keys are provided in the jargon listings for all entries that are neither dictionary words pronounced as in standard English nor obviouscompounds thereof.
ALT.2600 / #HACK FAQ I wrote down these questions and answers with the hope that I would never again have to explain the basics of hacking and that our conversation would move on to more advanced and interesting topics. In the beginning, this was the #hack FAQ. Later, Tomes suggested that we adopt it as the alt.2600 FAQ also. I have enjoyed writing this FAQ,and I
THE NEW HACKER'S DICTIONARY Jargon Construction. There are some standard methods of jargonification that became established quite early (i.e., before 1970), spreading from such sources as the Tech Model Railroad Club, the PDP-1 SPACEWAR hackers, and John McCarthy's original crew of LISPers. These include verb doubling, soundalike slang, the `-P'convention
THE NEW HACKER'S DICTIONARY lamer /n./ Synonym for luser, not used much by hackers but common among warez d00dz, crackers, and phreaker s. Oppose elite. Has the same connotations of self-conscious elitism that use of luser does among hackers. Crackers also THE NEW HACKER'S DICTIONARY n. Anyone who is not a hacker (or, sometimes, anyone not known to the hacker speaking); the noun form of sense 2. "I went to the talk, but the audience was full of randoms asking bogus questions". 10. /n./ (occasional MIT usage) One who lives at Random Hall. See also J. Random, some random X. ALT.2600 / #HACK FAQ The two types of satellite television networks currently available in the United States are C-Band and Ku-Band. Ku-Band is better known as DSS (Digital Satellite System). C-Band requires a minimum 6' dish, however it also gives you access to thousands of channels from 24 satellites. Ku-Band requires only an 18" dish and gives you access toa
THE NEW HACKER'S DICTIONARY Go to the previous, next section. = H = h A method of `marking' common words, i.e., calling attention to the fact that they are being used in a nonstandard, ironic, or humorous way. THE NEW HACKER'S DICTIONARY Go to the previous, next section.. How Jargon Works. Go to the previous, next section.previous, next section.Outpost9.com Menu
OUTPOST9
Computer Consulting and Management Services Providing Consulting, Installation, Repair, Engineering, and Management of your IT COMPUTER, CLOUD, AND NETWORKING SERVICES Not just providing the best service we can, but providing knowledge and talent to the community.Icon
IT SERVICES
Computer Development, re-location and setup, network design and configuration, hardware installations, POS support, Gaming systems, scheduled preventative maintenance packagesIcon
IT SUPPORT
Virus and Spyware Removal, Malicious software prevention, computer peripheral installation, Upgrades, Backups, Software supportIcon
COMPUTER REPAIR
Hardware diagnostics and repair, System tune-up, Hard drivereplacement, etc.
Icon
CLOUD SERVICES
Amazon Web Services, design and management, Cloud storage servicesIcon
HOSTING SERVICES
Hosting of Websites, email services, custom domains, DNS, etcIcon
SECURITY AUDITS AND PENETRATION TESTING Security Auditing of networks, servers, physical locations, penetration testing of networks, servers, physical assets ENGINEERING SERVICES NATIONWIDE We provide our services nation wide both in person and remotely MAKER LAB AND FORUMSComing Soon!
CONTACT US
Click HERE to email usOR
Call us at: 575-415-4321RESOURCE LINKS
* The archived Outpost9.com site * Cellular Telecommunication Services * Science projects in New MexicoSOCIAL MEDIA
* _Â _Twitter
* _Â _Facebook
* _Â _Instagram
* _Â _Github
© Outpost9 2020, All rights reserved.* Home
* Forums
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0