Jargon file v2.1.5 28 NOV 1990 -- part 6 of 6

Eric S. Raymond eric at snark.thyrsus.com
Thu Nov 29 05:00:42 AEST 1990


			= T =

T (tee) 1. [from LISP terminology for ``true''] Yes.  Usage: used in
   reply to a question, particularly one asked using the ``-P''
   convention).  See NIL.  2. See TIME T. 3. In transaction-processing
   circles, an abbreviation for the noun ``transaction''.

TALK MODE n. The state a terminal is in when linked to another via a
   bidirectional character pipe to support on-line dialogue between
   two or more users.  Talk mode has a special set of jargon words,
   used to save typing, which are not used orally:

	BCNU	Be seeing you.
	BTW	By the way...
	BYE?	Are you ready to unlink?  (This is the standard way to
		end a com mode conversation; the other person types
		BYE to confirm, or else continues the conversation.)
	CUL	See you later.
	FOO?	A greeting, also meaning R U THERE?  Often used in the
		case of unexpected links, meaning also ``Sorry if I
		butted in'' (linker) or ``What's up?'' (linkee).
	FYI	For your information...
	FYA	For your amusement...
	GA	Go ahead (used when two people have tried to type
		simultaneously; this cedes the right to type to
		the other).
	HELLOP	A greeting, also meaning R U THERE?  (An instance
		of the ``-P'' convention.)
	NIL	No (see the main entry for NIL).
	O	Over to you.
	OO	Over and out.
	OBTW	Oh, by the way...
	R U THERE?	Are you there?
	SEC	Wait a second (sometimes written SEC...).
	T	Yes (see the main entry for T).
	TNX	Thanks.
	TNX 1.0E6	Thanks a million (humorous).
	WTF	The universal interrogative particle. WTF knows what
		it means?
	WTH	What the hell
	<double CRLF>  When the typing party has finished, he types
		two CRLFs to signal that he is done; this leaves a
		blank line between individual ``speeches'' in the
		conversation, making it easier to re-read the
		preceding text.
	<name>:	When three or more terminals are linked, each speech
		is preceded by the typist's login name and a colon (or
		a hyphen) to indicate who is typing.  The login name
		often is shortened to a unique prefix (possibly a
		single letter) during a very long conversation.

   Most of the above ``sub-jargon'' is used at both Stanford and MIT.
   Several of these are also common in EMAIL, esp. FYI, FYA, BTW,
   BCNU, and CUL A few other abbrevs have been reported from
   commercial networks such as GEnie and Compuserve where on-line
   `live' chat including more than two people is common and usually
   involves a more `social' context, notably

	<g>	grin
	BRB	be right back
	HHOJ	ha ha only joking
	HHOS	HA HA ONLY SERIOUS
	LOL	laughing out load
	ROTF	rolling on the floor
	AFK	away from keyboard
	b4	before
	CU l8tr	see you later
	MORF	Male or Female?
	TTFN	ta-ta for now
	OIC	Oh, I see
	rehi	hello again

   These are not used at universities; conversely, most of the people
   who know these are unfamiliar with FOO?, BCNU, HELLOP, NIL, and T.

TANKED adj. Same as DOWN, used primarily by UNIX hackers. See also
   HOSED. Popularized as a synonym for ``drunk'' by Steve Dallas in
   the late lamented ``Bloom County'' comix.

TASTE n. [primarily MIT-DMS] The quality in programs which tends to be
   inversely proportional to the number of features, hacks, and kluges
   programmed into it.  Also, TASTY, TASTEFUL, TASTEFULNESS.  ``This
   feature comes in N tasty flavors.''  Although TASTEFUL and
   FLAVORFUL are essentially synonyms, TASTE and FLAVOR are not.

TCB (tee see bee) [IBM] Trouble Came Back. Intermittent or
   difficult-to reproduce problem which has failed to respond to
   neglect. Compare HEISENBUG.

TELERAT (tel'@-rat) n. Unflattering hackerism for ``Teleray'', a line
   of extremely losing terminals. See also TERMINAK, SUN-STOOLS,
   HP-SUX.

TELNET (telnet) v. To communicate with another ARPAnet host using the
   TELNET program.  TOPS-10 people use the word IMPCOM since that is
   the program name for them.  Sometimes abbreviated to TN.  ``I
   usually TN over to SAIL just to read the AP News.''

TENSE adj. Of programs, very clever and efficient.  A tense piece of
   code often got that way because it was highly bummed, but sometimes
   it was just based on a great idea.  A comment in a clever display
   routine by Mike Kazar: ``This routine is so tense it will bring
   tears to your eyes.  Much thanks to Craig Everhart and James
   Gosling for inspiring this hack attack.''  A tense programmer is
   one who produces tense code.

TERAFLOP CLUB (ter'a-flop kluhb) n. Mythical group of people who
   consume outragous amounts of computer time in order to produce a
   few simple pictures of glass balls with intricate ray tracing
   techniques.  Cal Tech professor James Kajiya is said to be the
   founding member.

TERMINAK (ter'mi-nak) [Caltech, ca. 1979] n. Any malfunctioning
   computer terminal. A common failure mode of Lear-Siegler ADM3a
   terminals caused the ``L'' key to produce the ``K'' code instead;
   complaints about this tended to look like ``Terminak #3 has a bad
   keyboard.  Pkease fix.'' See SUN-STOOLS, TELERAT, HP-SUX.

TERMINAL ILLNESS n. 1. Syn. with RASTER BURN.  2.  The `burn-in'
   condition your CRT tends to get if you don't have a screen saver.

TERPRI (ter'pree) [from the LISP 1.5 (and later, MacLISP) function to
   start a new line of output] v. To output a CRLF (q.v.).

THANKS IN ADVANCE [USENET] Conventional net.politeness ending a posted
   request for information or assistance. Sometimes written
   ``advTHANKSance''. See ``NET.'', NETIQUETTE.

THEOLOGY n. 1. Ironically used to refer to RELIGIOUS ISSUES.  2.
   Technical fine points of an abstruse nature, esp. those where the
   resolution is of theoretical interest but relatively MARGINAL with
   respect to actual use of a design or system. Used esp. around
   software issues with a heavy AI or language design component.
   Example: the deep- vs. shallow-binding debate in the design of
   dynamically-scoped LISPS.

THEORY n. Used in the general sense of idea, plan, story, or set of
   rules.  ``What's the theory on fixing this TECO loss?''  ``What's
   the theory on dinner tonight?''  (``Chinatown, I guess.'')
   ``What's the current theory on letting lusers on during the day?''
   ``The theory behind this change is to fix the following well-known
   screw...''

THINKO (thin'ko) [by analogy with `typo'] n. A bubble in the stream of
   consciousness; a momentary, correctable glitch in mental
   processing, especially one involving recall of information learned
   by rote. Compare MOUSO.

THRASH v. To move wildly or violently, without accomplishing anything
   useful.  Paging or swapping systems which are overloaded waste most
   of their time moving data into and out of core (rather than
   performing useful computation), and are therefore said to thrash.

THREE-FINGER SALUTE n. Syn. for VULCAN NERVE PINCH.

THUNK n. 1. An expression, frozen together with its environment for
   later evaluation if and when needed. The process of unfreezing a
   THUNK is called `forcing'. 2. People and and activities scheduled
   in a thunklike manner. ``It occurred to me the other day that I am
   rather accurately modelled by a thunk -- I frequently need to be
   forced to completion.'' -- paraphrased from a .plan file.

TICK n. 1. Interval of time; basic clock time on the computer.
   Typically 1/60 second.  See JIFFY.  2. In simulations, the discrete
   unit of time that passes ``between'' iterations of the simulation
   mechanism.  In AI applications, this amount of time is often left
   unspecified, since the only constraint of interest is that caused
   things happen after their causes.  This sort of AI simulation is
   often pejoratively referred to as ``tick-tick-tick'' simulation,
   especially when the issue of simultaneity of events with long,
   independent chains of causes is handwaved.

TIME T (tiem tee) n. 1. An unspecified but usually well-understood
   time, often used in conjunction with a later time T+1.  ``We'll
   meet on campus at time T or at Louie's at time T+1.''  2. SINCE (OR
   AT) TIME T EQUALS MINUS INFINITY: A long time ago; for as long as
   anyone can remember; at the time that some particular frob was
   first designed.

TIP OF THE ICE-CUBE [IBM] n. The visible part of something small and
   insignificant. Used as an ironic comment in situations where ``tip
   of the iceberg'' might be appropriate if the subject were actually
   nontrivial.

TIRED IRON [IBM] n. Hardware that is perfectly functional but enough
   behind the state of the art to have been superseded by new
   products, presumably with enough improvement in bang-per-buck that
   the old stuff is starting to look a bit like a DINOSAUR.

TLA (tee el ay) [Three-Letter-Abbreviation] n. 1. Self-describing
   acronym for a species with which computing terminology is infested.
   2. Any confusing acronym at all.  Examples include MCA, FTP, SNA,
   CPU, MMU, SCCS, DMU, FPU, TLA, NNTP.  People who like this looser
   usage argue that not all TLAs have three letters, just as not all
   four letter words have four letters.

TOAST 1. n. Any completely inoperable system, esp. one that has just
   crashed; ``I think BUACCA is toast.'' 2. v. To cause a system to
   crash accidentally, especially in a manner that requires manual
   rebooting. ``Rick just toasted harp again.''

TOASTER n. 1. The archetypal really stupid application for an embedded
   microprocessor controller esp. `toaster oven'; often used in
   comments which imply that a scheme is inappropriate technology.
   ``DWIM for an assembler?  That'd be as silly as running UNIX on
   your toaster!'' 2.  A very very dumb computer. ``You could run this
   program on any dumb toaster.'' See BITTY BOX, TOASTER, TOY.

TOOL 1. n. A program primarily used to create other programs, such as
   a compiler or editor or cross-referencing program. Oppose APP,
   OPERATING SYSTEM. 2. [UNIX] An application program with a simple,
   ``transparent'' (typically text-stream) interface designed
   specifically to be used in programmed combination with other tools
   (see FILTER).  3. [MIT] v.i. To work; to study.  See HACK (def #9).

TOPS-10 (tops-ten) n. DEC's proprietary OS for the fabled PDP-10
   machines, long a favorite of hackers but now effectively extinct. A
   fountain of hacker folklore; see Appendix B. See also ITS, TOPS-20,
   TWENEX, VMS, OPERATING SYSTEM.

TOPS-20 (tops-twen'tee) n. See TWENEX.

TOURIST [from MIT's ITS system] n. A guest on the system, especially
   one who generally logs in over a network from a remote location for
   games and other trivial purposes. One step below LUSER. TOURISTIC
   is often used as a pejorative, as in ``losing touristic scum''.

TOY (toy) n. A computer system; always used with qualifiers. 1. NICE
   TOY One which supports the speaker's hacking style adequately. 2.
   JUST A TOY A machine that yields insufficient COMPUTRONS for the
   speaker's preferred uses (this is not condemnatory as is BITTY BOX,
   toys can at least be fun). See also GET A REAL COMPUTER, BITTY BOX.

TOY PROBLEM [AI] n. A deliberately simplified or even oversimplified
   case of a challenging problem used to investigate, prototype, or
   test algorithms for the real problem. Sometimes used pejoratively.
   See also GEDANKEN.

TRAP 1. n. A program interrupt, usually used specifically to refer to
   an interrupt caused by some illegal action taking place in the user
   program.  In most cases the system monitor performs some action
   related to the nature of the illegality, then returns control to
   the program.  See UUO.  2. v. To cause a trap.  ``These
   instructions trap to the monitor.''  Also used transitively to
   indicate the cause of the trap.  ``The monitor traps all
   input/output instructions.''

TRASH v. To destroy the contents of (said of a data structure). The
   most common of the family of near-synonyms including MUNG, MANGLE
   and SCRIBBLE.

TRIVIAL adj. 1. In explanation, too simple to bother detailing. 2. Not
   worth the speaker's time. 3. Complex, but solvable by methods so
   well-known that anyone not utterly CRETINOUS would have thought of
   them already. Hackers' notions of triviality may be quite at
   variance with those of non-hackers. See NONTRIVIAL, UNINTERESTING.

TROGLODYTE [Commodore] n. A hacker who never leaves his cubicle.  The
   term `Gnoll' (from D&D) is also reported.

TROGLODYTE MODE [Rice University] n. Programming with the lights
   turned off, sunglasses on, and the (character) terminal inverted
   (black on white) because you've been up for so many days straight
   that your eyes hurt. Loud music blaring from a stereo stacked in
   the corner is optional but recommended. See LARVAL STAGE, MODE.

TROJAN HORSE n. A program designed to break security or damage a
   system that is disguised as something else benign, such as a
   directory lister or archiver. See VIRUS, WORM.

TRUE-HACKER [analogy with ``trufan'' from SF fandom] n.  One who
   exemplifies the primary values of hacker culture, esp.  competence
   and helpfulness to other hackers. A high complement.  ``He spent
   six hours helping me bring up UUCP and netnews on my FOOBAR 4000
   last week -- unequivocally the act of a true-hacker.''  Compare
   DEMIGOD, oppose MUNCHKIN.

TTY (tee-tee-wie [UNIX], titty [ITS]) n. 1. Terminal of the teletype
   variety, characterized by a noisy mechanical printer, a very
   limited character set, and poor print quality.  Usage: antiquated
   (like the TTYs themselves).  2. [especially UNIX] Any terminal at
   all; sometimes used to refer to the particular terminal controlling
   a job.

TUBE n. A CRT terminal. Never used in the mainstream sense of TV; real
   hackers don't watch TV, except for Loony Toons and Bullwinkle &
   Rocky and the occasional cheesy old swashbuckle movie.

TUNE [from automotive or musical usage] v. To optimize a program or
   system for a particular environment. One may `tune for time'
   (fastest execution) `tune for space' (least memory utilization) or
   `tune for configuration' (most efficient use of hardware). See BUM,
   HOT SPOT, HAND-HACK.

TWEAK v. To change slightly, usually in reference to a value.  Also
   used synonymously with TWIDDLE.  See FROBNICATE and FUDGE FACTOR.

TWENEX (twe-neks) n. The TOPS-20 operating system by DEC.  So named
   because TOPS-10 was a typically crufty DEC operating system for the
   PDP-10.  BBN developed their own system, called TENEX (TEN
   EXecutive), and in creating TOPS-20 for the DEC-20 DEC copied TENEX
   and adapted it for the 20.  Usage: DEC people cringe when they hear
   TOPS-20 referred to as ``Twenex'', but the term seems to be
   catching on nevertheless.  Release 3 of TOPS-20 is sufficiently
   different from release 1 that some (not all) hackers have stopped
   calling it TWENEX, though the written abbreviation ``20x'' is still
   used.

TWIDDLE n. 1. tilde (ASCII 176, ``~'').  Also called ``squiggle'',
   ``sqiggle'' (sic--pronounced ``skig'gul''), and ``twaddle'', but
   twiddle is by far the most common term.  2. A small and
   insignificant change to a program.  Usually fixes one bug and
   generates several new ones.  3. v. To change something in a small
   way.  Bits, for example, are often twiddled.  Twiddling a switch or
   knob implies much less sense of purpose than toggling or tweaking
   it; see FROBNICATE.

TWINK (twink) [UCSC] n. Equivalent to READ-ONLY USER.

TWO-TO-THE-N quant. Used like N, but referring to bigger numbers. ``I
   have two to the N things to do before I can go out for lunch''
   means you probably won't show up.

TWO-PI q. The number of years it takes to finish one's thesis.  Occurs
   in stories in the form: ``He started on his thesis; two pi years
   later...''.

			= U =

UNINTERESTING adj. 1. Said of a problem which, while NONTRIVIAL, can
   be solved simply by throwing sufficient resources at it. 2. Also
   said of problems for which a solution would neither advance the
   state of the art nor be fun to design and code. True hackers regard
   uninteresting problems as an intolerable waste of time, to be
   solved (if at all) by lesser mortals. See WOMBAT, SMOP.

U*IX, UN*X n. Used to refer to the Unix operating system (trademark
   and/or copyright AT&T) in writing, but avoiding the need for the
   ugly (tm) typography.  Also used to refer to any or all varieties
   of Unixoid operating systems. Ironically, some lawyers now claim
   (1990) that the requirement for superscript-tm has no legal force,
   but the asterisk usage is entrenched anyhow.

UNWIND THE STACK v. 1. During the execution of a procedural language
   one is said to `unwind the stack' from a called procedure up to a
   caller when one discards the stack frame and any number of frames
   above it, popping back up to the level of the given caller.  In C
   this is done with longjmp/setjmp; in LISP with THROW/CATCH.  This
   is sometimes necessary when handling exceptional conditions.  See
   also SMASH THE STACK. 2. People can unwind the stack as well, by
   quickly dealing with a bunch of problems ``Oh hell, let's do lunch.
   Just a second while I unwind my stack''.

UNWIND-PROTECT [MIT, from the name of a LISP operator] n. A task you
   must remember to perform before you leave a place or finish a
   project.  ``I have an unwind-protect to call my advisor.''

UNIX (yoo'nix) [In the authors' words, ``A weak pun on MULTICS''] n. A
   popular interactive time-sharing system originally invented in 1969
   by Ken Thompson after Bell Labs left the MULTICS project, mostly so
   he could play SPACEWAR on a scavenged PDP7. The turning point in
   UNIX's history came when it was reimplemented almost entirely in C
   in 1974, making it the first source-portable operating system.
   Fifteen years and a lot of changes later UNIX is the most widely
   used multiuser general-purpose operating system in the world. This
   fact probably represents the single most important victory yet of
   hackerdom over industry opposition. See VERSION 7, BSD UNIX, USG
   UNIX.

UP adj. 1. Working, in order.  ``The down escalator is up.''  2.
   BRING UP: v. To create a working version and start it.  ``They
   brought up a down system.''

UPLOAD [uhp'lohd] v. 1. To transfer code or data over a digital comm
   line from a smaller `client' system to a larger `host' one. Oppose
   DOWNLOAD. 2.  [speculatively] To move the essential patterns and
   algorithms which make up one's mind from one's brain into a
   computer.  Only those who are convinced that such patterns and
   algorithms capture the complete essence of the self view this
   prospect with aplomb.

URCHIN n. See MUNCHKIN.

USENET (yooz'net) n. A distributed bulletin board system supported
   mainly by UNIX machines, international in scope and probably the
   largest non-profit information utility in existence. As of early
   1990 it hosts over 300 topic groups and distributes up to 15
   megabytes of new technical articles, news, discussion, chatter, and
   FLAMAGE every day. See NEWSGROUP.

USER n. A programmer who will believe anything you tell him.  One who
   asks annoying questions.  Identified at MIT with ``loser'' by the
   spelling ``luser''.  See REAL USER.  [Note by GLS: I don't agree
   with RF's definition at all.  Basically, there are two classes of
   people who work with a program: there are implementors (hackers)
   and users (losers).  The users are looked down on by hackers to a
   mild degree because they don't understand the full ramifications of
   the system in all its glory.  (A few users who do are known as real
   winners.)  It is true that users ask questions (of necessity).
   Very often they are annoying or downright stupid.]

USER FRIENDLY adj. Programmer-hostile. Generally used by hackers in a
   hostile tone, to describe systems which hold the user's hand so
   obsessively that they make it painful for the more experienced and
   knowledgeable to get any work done. See MENUITIS, DROOL-PROOF
   PAPER, MACINTRASH.

USER-OBSEQUIOUS adj. Emphatic form of USER FRIENDLY. Connotes a system
   so verbose, inflexible, and determinedly simple-minded that it is
   nearly unusable. ``Design a system any fool can use and only a fool
   will want to use it''.

USG UNIX (yoo-ess-jee yoo'nix) n. Refers to AT&T UNIX versions after
   VERSION 7, especially System III and System V releases 1, 2 and 3.
   So called because at that time AT&T's support crew was called the
   `Unix Support Group' See BSD UNIX.

			= V =

VADDING (vad'ing) [from VAD, a permutation of ADV (i.e. ADVENT
   (q.v.)), used to avoid a particular sysadmin's continual
   search-and-destroy sweeps for the game] n. A leisure-time activity
   of certain hackers involving the covert exploration of the
   ``secret'' parts of large buildings -- basements, roofs, freight
   elevators, maintenance crawlways, steam tunnels and the like. A few
   go so far as to learn locksmithing in order to synthesize vadding
   keys. The verb is `to vad'. The most extreme and dangerous form of
   vadding is ELEVATOR RODEO, aka ELEVATOR SURFING, a sport played by
   wrasslin' down a thousand-pound elevator car with a three-foot
   piece of string, and then exploiting this mastery in various
   stimulating ways (such as elevator hopping, shaft exploration,
   rat-racing and the ever-popular drop experiments).  Kids, don't try
   this at home!

VANILLA adj. Ordinary flavor, standard.  See FLAVOR.  When used of
   food, very often does not mean that the food is flavored with
   vanilla extract!  For example, ``vanilla-flavored wonton soup'' (or
   simply ``vanilla wonton soup'') means ordinary wonton soup, as
   opposed to hot and sour wonton soup.  Applied to hardware and
   software. As in ``Vanilla Version 7 UNIX can't run on a vanilla
   11/34''.

VANNEVAR (van'@-var) n. A bogus technological prediction or foredoomed
   engineering concept, esp. one which fails by implicitly assuming
   that technologies develop linearly, incrementally, and in isolation
   from one another when in fact the learning curve tends to be highly
   nonlinear, revolutions are common, and competition is the rule. The
   prototype was Vannevar Bush's prediction of ``electronic brains''
   the size of the Empire State Building with a
   Niagara-Falls-equivalent cooling system for their tubes and relays,
   at a time when the semiconductor effect had already been
   demonstrated. Other famous vannevars have included commercial LISP
   machines and a paper from the late 1970s that purported to prove
   maximum achievable areal densities for ICs less than those
   routinely achieved five years later.

VAPORWARE n. Products announced far in advance of any shipment (which
   may or may not actually take place).

VAR (veir, vahr) n. Short for ``variable''. Compare ARG, PARAM.

VAX n. (vaks) [from Virtual Address eXtended] 1. The most successful
   minicomputer design in industry history, possibly excepting its
   immediate ancestor the PDP-11. Between its release in 1978 and
   eclipse by KILLER MICROS after about 1986 the VAX was probably the
   favorite hacker machine of them all, esp. after the 1982 release of
   4.2BSD UNIX (see BSD UNIX). Esp. noted for its large,
   assembler-programmer-friendly instruction set, an asset which
   became a liability after the RISC revolution following about 1985.
   2. A major brand of vacuum cleaner in Britain. Cited here because
   its alleged sales pitch, ``Nothing sucks like a VAX!'' became a
   sort of battle-cry of RISC partisans. Ironically, the slogan was
   actually that of a rival brand called Electrolux.

VAXEN (vak'sn) [from ``oxen'', perhaps influenced by ``vixen''] n. pl.
   The plural of VAX (a DEC machine). See BOXEN.

VEEBLEFESTER (vee'b at l-fes-tr) [from the ``Born Loser'' comix via
   Commodore; prob originally from Mad Magazine's ``Veeblefeetzer'' c.
   1960] n.  Any obnoxious person engaged in the alleged professions
   of marketing or management.  Antonym of HACKER. Compare SUIT,
   MARKETROID.

VENUS FLYTRAP (vee'n:s flie'trap) [after the plant] n. See FIREWALL.

VERBIAGE (ver'bee- at j) [IBM] n. Documentation.

VERSION 7 alt. V7 (vee-se'v at n) n. The 1978 unsupported release of UNIX
   (q.v.) ancestral to all current commercial versions. Before the
   release of the POSIX/SVID standards V7's features were often
   treated as a UNIX portability baseline.  See BSD, USG UNIX, UNIX.

VIRGIN adj. Unused, in reference to an instantiation of a program.
   ``Let's bring up a virgin system and see if it crashes again.''
   Esp. useful after contracting a VIRUS (q.v.) through SEX (q.v.).
   Also, by extension, unused buffers and the like within a program.

VIRUS [from SF] n. A cracker program that propagates itself by
   `infecting' (embedding itself in) other trusted programs,
   especially operating systems. See WORM, TROJAN HORSE.

VMS (vee em ess) n. DEC's proprietary operating system for their VAX
   minicomputer; one of the seven or so environments that looms
   largest in hacker folklore.  Many UNIX fans generously concede that
   VMS would probably be the hacker's favorite commercial OS if UNIX
   didn't exist; though true, this makes VMS fans furious. See also
   TOPS-10, TOPS-20, UNIX.

VIRTUAL adj. 1. Common alternative to LOGICAL (q.v.), but never used
   with compass directions.  2.  Performing the functions of.  Virtual
   memory acts like real memory but isn't.

VIRTUAL REALITY n. A form of network interaction incorporating aspects
   of role-playing games, interactive theater, improvisational comedy
   and ``true confessions'' magazines. In a ``virtual reality'' forum
   (such as USENET's alt.callahans newsgroup or the MUD experiments on
   Internet) interaction between the participants is written like a
   shared novel complete with scenery, ``foreground characters'' which
   may be personae utterly unlike the people who write them, and
   common ``background characters'' manipulable by all parties. The
   one iron law is that you may not write irreversible changes to a
   character without the consent of the person who ``owns'' it.
   Otherwise anything goes. See BAMF.

VISIONARY n. One who hacks vision (in an AI context, such as the
   processing of visual images).

VULCAN NERVE PINCH n. [From the old Star Trek TV series via Commodore
   Amiga hackers] The keyboard combination that forces a soft-boot or
   jump to ROM monitor (on machines that support such a feature). On
   many micros this is Ctrl-Alt-Del. Also called THREE-FINGER SALUTE.

			= W =

WABBIT (wabb'it) [almost certainly from Elmer Fudd's immortal line
   ``you wascal wabbit!''] n. 1. A legendary early hack reported on
   the PDP-10s at RPI and elsewhere around 1978. The program would
   reproduce itself twice every time it was run, eventually crashing
   the system.  2. By extension, any hack that includes infinite
   self-replication but is not a VIRUS or WORM. See also COOKIE
   MONSTER.

WALDO (wahl'doh) [probably taken from the story ``Waldo'', by
   Heinlein, which is where the term was first used to mean a
   mechanical adjunct to a human limb] Used at Harvard, particularly
   by Tom Cheatham and students, instead of FOOBAR as a meta-syntactic
   variable and general nonsense word.  See FOO, BAR, FOOBAR, QUUX.

WALKING DRIVES An occasional failure mode of magnetic-disk drives back
   in the days when they were 14'' wide WASHING MACHINES. Those old
   DINOSAURS carried terrific angular momentum; the combination of a
   misaligned spindle or worn bearings and stick-slip interactions
   with the floor could cause them to ``walk'' across a room, lurching
   alternate corners forward a couple of millimeters at a time. This
   could also be induced by certain patterns of drive access (a fast
   seek across the whole width of the disk, followed by a slow seek in
   the other direction). It is known that some bands of old-time
   hackers figured out how to induce disk-accessing patterns that
   would do this to particular drive models and held disk-drive races.
   This is not a joke!

WALL [shortened form of HELLO WALL, apparently from the phrase ``up
   against a blank wall''] [WPI] interj. 1. An indication of
   confusion, usually spoken with a quizzical tone.  ``Wall??''  2. A
   request for further explication. Compare OCTAL FORTY.

WALL TIME n. 1. `Real world' time (what the clock on the wall shows)
   as opposed to the system clock's idea of time. 2. The real running
   time of a program, as opposed to the number of CLOCKS required to
   execute it (on a timesharing system these will differ, as no one
   program gets all the CLOCKS).

WALLPAPER n. A file containing a listing (e.g., assembly listing) or
   transcript, esp. a file containing a transcript of all or part of a
   login session.  (The idea was that the LPT paper for such listings
   was essentially good only for wallpaper, as evidenced at SAIL where
   it was used as such to cover windows.)  Usage: not often used now,
   esp. since other systems have developed other terms for it (e.g.,
   PHOTO on TWENEX).  The term possibly originated on ITS, where the
   commands to begin and end transcript files were :WALBEG and
   :WALEND, with default file DSK:WALL PAPER.

WASHING MACHINE n. Old-style hard disks in floor-standing cabinets. So
   called because of the size of the cabinet and the ``top-loading''
   access to the media packs. See WALKING DRIVES.

WEASEL [Cambridge University] A ``naive user'', one who deliberately
   or accidentally does things which are stupid or ill-advised.
   Roughly synonymoius with LUSER.

WEDGED [from ``head wedged up ass''] adj. 1. To be in a locked state,
   incapable of proceeding without help.  (See GRONK.)  Often refers
   to humans suffering misconceptions.  ``The swapper is wedged.''
   This term is sometimes used as a synonym for DEADLOCKED (q.v.).  2.
   [UNIX] Specifically used to describe the state of a TTY left in a
   losing state by abort of a screen-oriented program or one that has
   messed with the line discipline in some obscure way.

WEEBLE (weeb'l) [Cambridge University] interj. Use to denote
   frustration, usually at amazing stupidity.  ``I stuck the disk in
   upside down.'' ``Weeble...'' Compare GURFLE.

WEEDS n. Refers to development projects or algorithms that have no
   possible relevance or practical application.  Comes from ``off in
   the weeds''.  Used in phrases like ``lexical analysis for microcode
   is serious weeds...''

WELL BEHAVED adj. Of software: conforming to coding guidelines and
   standards.  Well behaved software uses the operating system to do
   chores such as keyboard input, allocating memory and drawing
   graphics. Oppose ILL-BEHAVED.

WETWARE n. 1. The human brain, as opposed to computer hardware or
   software (as in ``Wetware has at most 7 +/- 2 registers'').  2.
   Human beings (programmers, operators, administrators) attached to a
   computer system, as opposed to the system's hardware or software.

WHAT n. The question mark character (``?'').  See QUES.  Usage: rare,
   used particularly in conjunction with WOW.

WHEEL [from Twenex, q.v.] n. A privileged user or WIZARD (sense #2).
   Now spreading into the UNIX culture. Privilege bits are sometimes
   called WHEEL BITS. The state of being in a privileged logon is
   sometimes called WHEEL MODE.

WHEEL WARS [Stanford University] A period in LARVAL STAGE during which
   student wheels hack each other by attempting to log each other out
   of the system, delete each other's files, or otherwise wreak havoc,
   usually at the expense of the lesser users.

WHITE BOOK, THE n. Kernighan & Ritchie's _The_C_Programming_Language_,
   esp. the classic and influential first edition. Also called simply
   ``K&R''. See SILVER BOOK, PURPLE BOOK, ORANGE BOOK.

WIBNI [Bell Labs, Wouldn't It Be Nice If] n. What most requirements
   documents/specifications consist entirely of. Compare IWBNI.

WIDGET n.  1. A meta-thing.  Used to stand for a real object in
   didactic examples (especially database tutorials).  Legend has it
   that the original widgets were holders for buggy whips.  2. A user
   interface object in X Window System GUIs.

WIMP ENVIRONMENT n. [acronymic from Window, Icon, Mouse, Pointer] A
  graphical-user-interface based environmend, as described by a hacker
  who prefers command-line interfaces for their superior flexibility
   and
  extensibility.

WIN [from MIT jargon] 1. v. To succeed.  A program wins if no
   unexpected conditions arise.  2. BIG WIN: n. Serendipity.  Emphatic
   forms: MOBY WIN, SUPER WIN, HYPER-WIN (often used interjectively as
   a reply).  For some reason SUITABLE WIN is also common at MIT,
   usually in reference to a satisfactory solution to a problem.  See
   LOSE.

WINNAGE (win'@j) n. The situation when a lossage is corrected, or when
   something is winning.  Quite rare.  Usage: also quite rare.

WINNER 1. n. An unexpectedly good situation, program, programmer or
   person.  2. REAL WINNER: Often sarcastic, but also used as high
   praise.

WINNITUDE (win'i-tood) n. The quality of winning (as opposed to
   WINNAGE, which is the result of winning).  ``That's really great!
   Boy, what winnitude!''

WIREHEAD n. 1. A hardware hacker, especially one who concentrates on
   communications hardware.  2. An expert in local area networks.  A
   wirehead can be a network software wizard too, but will always have
   the ability to deal with network hardware, down to the smallest
   component.  Wireheads are known for their ability to lash up an
   Ethernet terminator from spare resistors, for example.

WIZARD n. 1. A person who knows how a complex piece of software or
   hardware works; someone who can find and fix his bugs in an
   emergency.  Rarely used at MIT, where HACKER is the preferred term.
   2. A person who is permitted to do things forbidden to ordinary
   people, e.g., a ``net wizard'' on a TENEX may run programs which
   speak low-level host-imp protocol; an ADVENT wizard at SAIL may
   play Adventure during the day. 3. A UNIX expert. See GURU.

WIZARD MODE [from nethack] n. A special access mode of a program or
   system, usually passworded, that permits some users godlike
   privileges.  Generally not used for operating systems themselves
   (ROOT MODE or WHEEL MODE would be used instead).

WOMBAT [Waste Of Money, Brains and Time] adj. Applied to problems
   which are both profoundly UNINTERESTING in themselves and unlikely
   to benefit anyone interesting even if solved. Often used in
   fanciful constructions such as WRESTLING WITH A WOMBAT. See also
   CRAWLING HORROR.

WONKY (won'kee) [from Australian slang] adj. Yet another approximate
   synonym for BROKEN. Specifically connotes a malfunction which
   produces behavior seen as crazy, humorous, or amusingly perverse.
   ``That was the day the printer's font logic went wonky and
   everybody's listings came out in Elvish.'' Also in WONKED OUT. See
   FUNKY.

WORM [from `tapeworm' in John Brunner's _Shockwave_Rider_, via XEROX
   PARC] n. A cracker program that propagates itself over a network,
   reproducing itself as it goes. See `VIRUS'. Perhaps the best known
   example was RTM's `Internet Worm' in '87, a `benign' one that got
   out of control and shut down hundreds of Suns and VAXen nationwide.
   See VIRUS, TROJAN HORSE, ICE.

WOUND AROUND THE AXLE adj. In an infinite loop.  Often used by older
   computer types, along with ``out in the WEEDS''.

WOW See EXCL.

WRONG THING, THE n. A design, action or decision which is clearly
   incorrect or inappropriate. Often capitalized; always emphasized in
   speech as if capitalized. Antonym: THE RIGHT THING (q.v.).

WUGGA WUGGA (wuh'guh wuh'guh) n. Imaginary sound that a computer
   program makes as it labors with a tedious or difficult task.
   Compare CRUNCHA CHRUNCHA CRUNCHA.

			= X =

X Used in various speech and writing contexts in roughly its algebraic
   sense of ``unknown within a set defined by context'' (compare `N').
   Thus: the abbreviation 680x0 stands for 68000, 68010, 68020, 68030
   or 68040, and 80x86 stands for 80186, 80286 80386 or 80486 (note
   that a UNIX hacker might write these as 680[01234]0 and 80[1234]86
   or 680?0 and 80?86 respectively; see GLOB).

XYZZY (exs-wie-zee-zee-wie) [from the ADVENT game] adj. A magic word.
   This has actually been implemented as an undocumented no-op command
   on several OSs; in Data General's AOS, for example, it would
   respond ``Nothing happens.'' just as ADVENT did before a player had
   performed the action that enabled the word. See PLUGH.

			= Y =

YABA (ya'buh) [Cambridge University] n. Yet Another Bloody Acronym.
   Whenever some program is being named, someone invariably suggests
   that it be given a name which is acronymic. The response from those
   with a trace of originality is to remark ironically that the
   proposed name would then be ``YABA-compatible''. Also used in
   response to questions like ``What is WYSIWYG?'' ``YABA.'' See also
   TLA.

YOW! (yow) [from Zippy the Pinhead comix] interj. Favored hacker
   expression of humorous surprise or emphasis. ``Yow! Check out what
   happens when you twiddle the foo option on this display hack!''
   Compare GURFLE, MUMBLE FROTZ.

YOYO MODE n. State in which the system is said to be when it rapidly
   alternates several times between being up and being down.

YU-SHIANG WHOLE FISH (yoo-shyang hohl fish) n. The character gamma
   (extended SAIL ASCII 11), which with a loop in its tail looks like
   a fish.  Usage: used primarily by people on the MIT LISP Machine.
   Tends to elicit incredulity from people who hear about it
   second-hand.

			= Z =

ZEN v. To figure out something by meditation, or by a sudden flash of
   enlightenment. Originally applied to bugs, but occasionally applied
   to problems of life in general. ``How'd you figure out the buffer
   allocation problem?'' ``Oh, I zenned it''.  Contrast GROK, which
   connotes a time-extended version of zenning a system.

ZERO v. 1. To set to zero.  Usually said of small pieces of data, such
   as bits or words.  2. To erase; to discard all data from.  Said of
   disks and directories, where ``zeroing'' need not involve actually
   writing zeroes throughout the area being zeroed.  See SCRIBBLE.

ZIPPERHEAD [IBM] n. A person with a closed mind.

ZOMBIE [UNIX] n. A process which has been killed but has not yet
   relinquished its process table slot. These show up in ps(1)
   listings occasionally.

ZORK (zork) n. Second of the great early experiments in computer
   fantasy gaming; see ADVENT. Originally written on MIT-DMS during
   the late seventies, later distributed with BSD UNIX and
   commercialized as ``The Zork Trilogy'' by Infocom.

==================== MAIN TEXT ENDS HERE ===================================

APPENDIX A:
		THE UNTIMELY DEMISE OF MABEL THE MONKEY
			a cautionary tale

   The following, modulo a couple of inserted commas and capitalization
changes for readability, is the exact text of a famous USENET message.
The reader may wish to review the definitions of PM and MOUNT in the main
text before continuing.

Date: Wed 3 Sep 86 16:46:31-EDT
From: "Art Evans" <Evans at TL-20B.ARPA>
Subject: Always Mount a Scratch Monkey
To: Risks at CSL.SRI.COM

My friend Bud used to be the intercept man at a computer vendor for
calls when an irate customer called.  Seems one day Bud was sitting at
his desk when the phone rang.
    
    Bud:	Hello.			Voice:	YOU KILLED MABEL!!
    B:		Excuse me?		V:	YOU KILLED MABEL!!

This went on for a couple of minutes and Bud was getting nowhere, so he
decided to alter his approach to the customer.
    
    B:		HOW DID I KILL MABEL?	V:	YOU PM'ED MY MACHINE!!

Well, to avoid making a long story even longer, I will abbreviate what had
happened.  The customer was a Biologist at the University of Blah-de-blah,
and he had one of our computers that controlled gas mixtures that Mabel (the
monkey) breathed.  Now, Mabel was not your ordinary monkey.  The University
had spent years teaching Mabel to swim, and they were studying the effects
that different gas mixtures had on her physiology.  It turns out that the
repair folks had just gotten a new Calibrated Power Supply (used to
calibrate analog equipment), and at their first opportunity decided to
calibrate the D/A converters in that computer.  This changed some of the gas
mixtures and poor Mabel was asphyxiated.  Well, Bud then called the branch
manager for the repair folks:

    Manager:	Hello
    B:		This is Bud, I heard you did a PM at the University of
    		Blah-de-blah.
    M:		Yes, we really performed a complete PM.  What can I do
		for you?
    B:		Can you swim?

The moral is, of course, that you should always mount a scratch monkey.

              ~~~~~~~~~~~~~~~~~~~~~~

There are several morals here related to risks in use of computers.
Examples include, ``If it ain't broken, don't fix it.''  However, the
cautious philosophical approach implied by ``always mount a scratch
monkey'' says a lot that we should keep in mind.

Art Evans
Tartan Labs

APPENDIX B:

	OBSOLESCENT TERMS FROM THE JARGON FILE

   The following terms appeared in the main listing of the original
Jargon File, but have been rendered obsolescent by the passage of
time, the march of technology, the death of the DEC PDP-10, and the
May 1990 shutdown of the ITS machines. They are collected here for
possible historical interest.

AOS (aus (East coast) ay-ahs (West coast)) [based on a PDP-10
   increment instruction] v. To increase the amount of something.
   ``Aos the campfire.''  Usage: considered silly, and now
   obsolescent.  See SOS. Now largely supplanted by BUMP.

BIG BLT, THE (big belt, th:) n., obs. Shuffling operation on the
   PDP-10 under some operating systems that consumes a significant
   amount of computer time. See BLT in the main listing.

BIN (bin) [short for BINARY; used as a second file name on ITS] 1. n.
   BINARY.  2. BIN FILE: A file containing the BIN for a program.
   Usage: used at MIT, which runs on ITS.  The equivalent term at
   Stanford was DMP (pronounced ``dump") FILE.  Other names used
   include SAV ("save") FILE (DEC and Tenex), SHR ("share") and LOW
   FILES (DEC), and COM FILES (CP/M), and EXE ("ex'ee") FILE (DEC,
   Twenex, MS-DOS, occasionally UNIX).  Also in this category are the
   input files to the various flavors of linking loaders (LOADER,
   LINK-10, STINK), called REL FILES. See EXE in main text.

COM[M] MODE (kom mohd) [from the ITS feature for linking two or more
   terminals together so that text typed on any is echoed on all,
   providing a means of conversation among hackers; spelled with one
   or two Ms] Syn. for TALK MODE in main text.

DIABLO (dee-ah'blow) [from the Diablo printer] 1. n. Any letter-
   quality printing device.  2. v. To produce letter-quality output
   from such a device. See LASE in main listing.

DMP (dump) See BIN.

DPB (duh-pib') [from the PDP-10 instruction set] v., obs. To plop
   something down in the middle.

ENGLISH (ing'lish) n. The source code for a program, which may be in
   any language, as opposed to BINARY.  Usage: obsolete, used mostly
   by old-time hackers, though recognizable in context.  On ITS,
   directory SYSENG was where the ``English'' for system programs is
   kept, and SYSBIN, the binaries.  SAIL had many such directories,
   but the canonical one is [CSP,SYS].

EXCH (ex'chuh, ekstch) [from the PDP-10 instruction set] v., obs. To
   exchange two things, each for the other.

IMPCOM (imp'kahm) See TELNET. This term is now nearly obsolete.

IRP (erp) [from the MIDAS pseudo-op which generates a block of code
   repeatedly, substituting in various places the car and/or cdr of
   the list(s) supplied at the IRP] v. To perform a series of tasks
   repeatedly with a minor substitution each time through.  ``I guess
   I'll IRP over these homework papers so I can give them some random
   grade for this semester.'' Usage: rare, now obsolescent.

JFCL (djif'kl or djafik'l) [based on the PDP-10 instruction that acts
   as a fast no-op] v., obs. To cancel or annul something.  ``Why
   don't you jfcl that out?"

JRST (jerst) [based on the PDP-10 jump instruction] v., obs. To
   suddenly change subjects.  Usage: rather rare.  ``Jack be nimble,
   Jack be quick; Jack jrst over the candle stick.''

JSYS (jay'sis), pl. JSI (jay'sigh) [Jump to SYStem] v.,obs. See UUO.

LDB (lid'dib) [from the PDP-10 instruction set] v. To extract from the
   middle.

MOBY (moh'bee) n.  This term entered the world of AI with the Fabritek
   256K moby memory of MIT-AI. Thus, classically, 256K words, the size
   of a PDP-10 moby.  (The maximum address space means the maximum
   normally addressable space, as opposed to the amount of physical
   memory a machine can have.  Thus the MIT PDP-10s each have two
   mobies, usually referred to as the ``low moby'' (0-777777) and
   ``high moby'' (1000000-1777777), or as ``moby 0'' and ``moby 1''.
   MIT-AI had four mobies of address space: moby 2 was the PDP-6
   memory, and moby 3 the PDP-11 interface.)  In this sense ``moby''
   is often used as a generic unit of either address space (18. bits'
   worth) or of memory (about a megabyte, or 9/8 megabyte (if one
   accounts for difference between 32- and 36-bit words), or 5/4
   megacharacters).

PHANTOM (fan'tm) [Stanford] n. The SAIL equivalent of a DRAGON (q.v.).
   Typical phantoms include the accounting program, the news-wire
   monitor, and the lpt and xgp spoolers. UNIX and most other
   environments call this sort of program a background DEMON or
   DAEMON.

PPN (pip'in) [DEC terminology, short for Project-Programmer Number] n.
   1. A combination `project' (directory name) and programmer name,
   used to identify a specific directory belonging to that user.  For
   instance, ``FOO,BAR'' would be the FOO directory for user BAR.
   Since the name is restricted to three letters, the programmer name
   is usually the person's initials, though sometimes it is a nickname
   or other special sequence.  (Standard DEC setup is to have two
   octal numbers instead of characters; hence the original acronym.)
   2.  Often used loosely to refer to the programmer name alone.  ``I
   want to send you some mail; what's your ppn?''  Usage: not used at
   MIT, since ITS does not use ppn's.  The equivalent terms would be
   UNAME and SNAME, depending on context, but these are not used
   except in their technical senses.

REL (rel) See BIN in the main listing. Short for `relocatable', used
   on the old TOPS-10 OS.

SAV (sayv) See BIN.

SHR (sheir) See BIN.

SOS 1. (ess-oh-ess) n. A losing editor, SON OF STOPGAP.  2. (sahss) v.
   Inverse of AOS, from the PDP-10 instruction set.

STY (pronounced ``stie'', not spelled out) n. A pseudo-teletype, which
   is a two-way pipeline with a job on one end and a fake keyboard-tty
   on the other.  Also, a standard program which provides a pipeline
   from its controlling tty to a pseudo-teletype (and thence to
   another tty, thereby providing a ``sub-tty").  This is MIT
   terminology; the SAIL, DEC and UNIX equivalent is PTY (see main
   text).

SUPDUP (soop'doop) v. To communicate with another ARPAnet host using
   the SUPDUP program, which is a SUPer-DUPer TELNET talking a special
   display protocol used mostly in talking to ITS sites.  Sometimes
   abbreviated to SD.

TECO (tee'koh) [acronym for Text Editor and COrrector] 1. n. A text
   editor developed at MIT, and modified by just about everybody.  If
   all the dialects are included, TECO might well be the single most
   prolific editor in use.  Noted for its powerful pseudo-programming
   features and its incredibly hairy syntax.  2. v. obs. To edit using
   the TECO editor in one of its infinite forms; sometimes used to
   mean ``to edit'' even when not using TECO!  Usage: rare at SAIL,
   where most people wouldn't touch TECO with a TENEX pole.

   [Historical note, c. 1982: DEC grabbed an ancient version of MIT
   TECO many years ago when it was still a TTY-oriented editor.  By
   now, TECO at MIT is highly display-oriented and is actually a
   language for writing editors, rather than an editor.  Meanwhile,
   the outside world's various versions of TECO remain almost the same
   as the MIT version of the early 1970s.  DEC recently tried to
   discourage its use, but an underground movement of sorts kept it
   alive. -- GLS]

   [Since this note was written I found out that DEC tried to force
   their hackers by administrative decision to use a hacked up and
   generally lobotomized version of SOS instead of TECO, and they
   revolted. -- MRC]

   [1990 update: TECO is now pretty much one with the dust of history,
   having been replaced (both functionally and psychologically) almost
   everywhere by GNU EMACS -- ESR]

UUO (yoo-yoo-oh) [short for ``Un-Used Operation"] n. A PDP-10 system
   monitor call.  The term ``Un-Used Operation'' comes from the fact
   that, on PDP-10 systems, monitor calls are implemented as invalid
   or illegal machine instructions, which cause traps to the monitor
   (see TRAP).  The SAIL manual describing the available UUOs has a
   cover picture showing an unidentified underwater object.  See YOYO.
   [Note: DEC sales people have since decided that ``Un-Used
   Operation" sounds bad, so UUO now stands for ``Unimplemented User
   Operation''.]  Tenex and Twenex systems use the JSYS machine
   instruction (q.v.), which is halfway between a legal machine
   instruction and a UUO, since KA-10 Tenices implement it as a
   hardware instruction which can be used as an ordinary subroutine
   call (sort of a ``pure JSR").

WORMHOLE (werm'hohl) n. A location in a monitor which contains the
   address of a routine, with the specific intent of making it easy to
   substitute a different routine.  The following quote comes from
   ``Polymorphic Systems'', vol. 2, p. 54:

   ``Any type of I/O device can be substituted for the standard device
   by loading a simple driver routine for that device and installing
   its address in one of the monitor's `wormholes.'* ---------- *The
   term `wormhole' has been used to describe a hypothetical
   astronomical situation where a black hole connects to the `other
   side' of the universe.  When this happens, information can pass
   through the wormhole, in only one direction, much as `assumptions'
   pass down the monitor's wormholes.''

   This term is now obsolescent. Modern operating systems use clusters
   of wormholes extensively (for modularization of I/O handling in
   particular, as in the UNIX device-driver organization) but the
   preferred jargon for these clusters is `device tables', `jump
   tables' or `capability tables'.

XGP (eks-jee-pee) 1. n. Xerox Graphics Printer.  2. v. To print
   something on the XGP.  ``You shouldn't XGP such a large file.''

YOYO (yoh'yoh) n. DEC service engineers' slang for UUO (q.v.).  Usage:
   rare at Stanford and MIT, has been found at random DEC
   installations.

APPENDIX C:

			FOR FURTHER READING

Here are some other books you can read to help you understand the hacker
mindset.

Godel, Escher, Bach: An Eternal Golden Braid
Hofstadter, Douglas
Basic Books, New York 1979
ISBN 0-394-74502-7

This book reads like an intellectual Grand Tour of hacker
preoccupations. Music, mathematical logic, programming, speculations on
the nature of intelligence, biology, and Zen are woven into a brilliant
tapestry themed on the concept of encoded self-reference. The perfect
left-brain companion to _Illuminatus_.


Illuminatus (three vols)
1. The Golden Apple
2. The Eye in the Pyramid
3. Leviathan
Shea, Robert & Wilson, Robert Anton
Dell Books, New York 1975
ISBN 0-440-{14688-7,34691-6,14742-5}

This work of alleged fiction is an incredible berserko-surrealist
rollercoaster of world-girdling conspiracies, intelligent dolphins,
the fall of Atlantis, who really killed JFK, sex, drugs, rock and roll
and the Cosmic Giggle Factor. First published in 3 volumes, but
there's now a one-volume trade paperback carried by most chain
bookstores under SF. The perfect right-brain companion to Hofstadter's
_Godel_Escher,_Bach:_An_Eternal_Golden_Braid_. See ERIS, DISCORDIANISM,
RANDOM NUMBERS, CHURCH OF THE SUB-GENIUS.

The Hitchhiker's Guide to the Galaxy
Douglas Adams
Pocket Books 1981, New York
ISBN 0-671-46149-4

This Monty-Python-in-Space spoof of SF genre traditions has been
popular among hackers ever since the original British radio show.
Read it if only to learn about Vogons (see BOGONS) and the
significance of the number 42 (see RANDOM NUMBERS) -- also why the
winningest chess program of 1990 was called DEEP THOUGHT.

The Tao of Programming
James Geoffrey
Infobooks 1987, Santa Monica,
ISBN 0-931137-07-1

This gentle, funny spoof of the _Tao_Te_Ching_ contains much that is
illuminating about the hacker way of thought. ``When you have learned
to snatch the error code from the trap frame, it will be time for you
to leave.''

Hackers
Steven Levy
Anchor/Doubleday 1984, New York
ISBN 0-385-19195-2

Levy's book is at its best in describing the early MIT hackers at the
Model Railroad Club and the early days of the microcomputer revolution.
He never understood UNIX or the networks, though, and his enshrinement of
RMS as ``the last hacker'' turns out to have been quite misleading.

The Cuckoo's Egg
Clifford Stoll
Doubleday 1989, New York
ISBN 0-385-24946-2

Clifford Stoll's absorbing tale of how he tracked Marcus Hess and the
Chaos Club cracking-ring nicely illustrates the difference between `hacker'
and `cracker'. And Stoll's portrait of himself and his lady Barbara and his
friends at Berkeley and on the Internet paints a marvelously vivid picture
of how hackers and the people around them like to live and what they think.



======================= END OF THE JARGON FILE ================================
# The following sets edit modes for GNU EMACS
# Local Variables:
# mode:text
# case-fold-search:nil
# fill-prefix:"   "
# fill-column:70
# End:



More information about the Comp.unix.internals mailing list