SlideShare a Scribd company logo
***********************************************************************
This article is being presented through the *StarBoard* Journal of the
FlagShip/StarShip SIGs (Special Interest Groups) on Delphi and GEnie
telecommunication networks. Permission is hereby granted to non-profit
organizations only to reprint this article or pass it along electronically as long as proper credit is given to both the author and the
*StarBoard* Journal.
***********************************************************************
A Short 'HACKERSPEAK' Glossary
A reference to a few of the terms used by many computer hackers.
(Researched and compiled by members of the Hollywood User Group)
arg - (argh) noun.

An argument, in the mathematical sense.

automagically - adverb. Automatically, but in a way which, for some
reason (for example, because it's too complicated or too trivial) the
speaker doesn't feel like explaining.
bells and whistles - n. Unnecessary (but often convenient, useful,
good-looking, or amusing) features of a program or other object. Added
to a bare-bones, working program.
bit - n. 1) A unit of information obtained by asking a question (e.g.
- 'I need a few bits about Punter protocol') 2) A mental flag;
reminder that something should be done eventually.
buffer - verb. The act of saving or setting aside something to be done
later. (e.g. - 'I'm going to buffer that and go eat now').
bug - n. A problem or mistake; unwanted property or side effect.
Usually of a program, but can refer to a person. Can be very simple or
very complicated. Antonym: FEATURE.
bum - v. To improve something by rearranging or removing its parts.
Most often done to a program to increase speed or save memory space,
usually at the expense of clarity.
buzz - v. Of a program, to run without visible progress or certainty
of finishing. Resembles CATATONIA except that a buzzing loop may
eventually end.
canonical - (ki NAHN i kil) adjective.
of doing something.

Standard, usual or ordinary way

catatonia - n. A condition in which something is supposed to happen,
but nothing does. (e.g. - Nothing you type will appear on the screen.
It's catatonic. Often means a CRASH has occured.)
crash - 1) n. Sudden, drastic failure. Usually refers to a complete
computer system or program. 2) v. To fail suddenly or cause to fail.
3) v. Of people, to go to sleep.
creeping featurism even more so because
the program had this
a patchwork program,

n. Tendency for anything complicated to become
people keep saying, 'Hey, it would be terrific if
feature, and could do this, and...' The result is
confusing to read, with a lot of 'neat' features.

crock - n. Said of a program that works, but in an extremely awkward
or cumbersome manner.
crunch - v. To process, usually in a time-consuming, complex way.
Example: Performing large, repetitive numerical computations is called
'number crunching'. 2) v. To reduce the size of a file (often in a
complicated way) to save space.
dec'ed out - (decked out) adj. Stoned, drunk (and possibly trying to
program, regardless). Uncomplimentary. Derives from the 65-- series
ML opcode DECrement, i.e.: decrease a value.
elegant - adj. Said of a piece of code that does the RIGHT THING in a
way beautiful to look at.
feature - n. An extra property or behaviour added to a program that
already does the job. May or may not be useful, necessary or
convenient.
fencepost error - n. A mathematical 'off-by-one' error. Most often
found in programs that must count loops (it will count one time too
many, or too few). Term comes from the problem: 'If you build a fence
100 feet long with posts 10 feet apart, how many posts fo you need?'
Example: Suppose you want to process an array of items x thru y. How
many are there? The correct answer is x-y+1 (not x-y, which would be
off by one).
flavor - n. variety, kind, type.
pleasing).

(flavorful - adj.

flush - v. To scratch, delete or destroy something.
superfluous or useless.

Aesthetically
Often something

fudge - v. Perform in an incomplete, but marginally acceptable way.
'I fudged it, so it works.'
GC - (jee see) 1) v. To clean up, throw away useless things. 2) To
forget. GC is an abreviation of the term 'Garbage Collection', the
common method of freeing up memory space.
glitch - n. Sudden interruption in electrical service, common sense,
or program function. Usually happens only when you pray that it
doesn't.
grovel - v.
detail.

To work interminably, examine minutely or in extreme

gun - v. To forcibly terminate a program.
so I gunned it.'

'It was a boring display,

hack - n. An appropriate application of ingenuity. It could be a
quick-and-dirty bug fix, or a time-consuming and elegant work of art.
A clever technique.
hack value - n. The motivation for expending effort and time toward a
seemingly pointless goal, the point being the resulting hack.
hack attack - n. Period of greatly increased hacking activity.
be confused with a Mac-Attack.

Not to

hacker - n. 1) One who greatly enjoys learning the details of a
computer system and how to stretch their capabilities (as opposed to
REAL USERS who learn only the minimum amount necessary). 2) One who
programs enthusiastically, rather than just theorizing about it. 3)
One capable of appreciating HACK VALUE. 4) An expert of any kind 5) A
malicious or inquisitive meddler (in the case of a 'system hacker' or a
'password hacker').
inc it up - (also 'incing') v. Specifically related to studying,
reading, or learning ML. Derives from the 65-- series ML instruction
INCrement a value; i.e. increase it.
jock - n. Programmer characterized by the large, cumbersome,
brute-force programs he/she writes. The programs may work, but slowly,
inelegantly, or in an ugly way.
kludge - (kloog) 1) n. Clever programming trick, most often to fix a
bug. Efficient, but maybe unclear. 2) v. To insert a kludge into a
program (to fix a bug or add a feature).
magic - adj.

Something as yet unexplained or too complex to imagine.

M&M's - n. Mental and Midget; i.e. Mental Midget. Uncomplimentary
term applied most often to 'system hackers' who intrude for disruptive
or destructive purposes (like to crash BBS's).
misfeature - n. A FEATURE that eventually turns out to be more trouble
than it was worth, possibly because it is inadequate for a new user or
situation that has evolved. Misfeatures are different from bugs or
side-effects in that they are often more basic to the program design
and, at one time, were carefully planned.
moby - 1) adj. Immense, complex, or impressive.
a computers address space.

2) n.

Total size of

mode - n. A general state. Examples: DAY MODE - state a person is in
when s/he is working days and sleeping nights.
mumble - interjection. Said when the correct response is too
complicated to put into words or has not been thought out. Can
indicate a reluctance to enter a long discussion.
mumblage - n.
that stuff'.

The subject matter of one's mumbling.

Replaces 'all

nop around (or nopping) - v. Hanging out; not doing much; not
programming. Derives from the 65-- series ML instruction code 'NOP'
(No OPeration).
obie (or o.b.) - n. Derives from a pun with the word 'OverByte'.
Usually relates to a ML routine that doesn't work because of some
small mistake, possibly an incorrect addressing mode or even a typing
error. Most often one or two bytes wrong.
patch - 1) n. Piece of code intended as a quick-and-dirty remedy to a
BUG or MISFEATURE. 2) v. To fix something temporarily; insert a patch
into a piece of code; make the main program machine-specific.
punt - v.

To give up; decide not to do.

rave - v. 1) To persist in discussing something. 2) To speak
authoritatively about that which one knows very little. 3) To
proselytize.
real user - n. A commercial user; a non-hacker who uses computer
applications only.
Real World, The - n. 1) Places where programs have only business
applications. 2) Institutions such as IBM. 3) The location of
non-programmers and non-programming activity. The first two
definitions are uncomplimentary; the third is not.
Right Thing, The - n.
use, do, say, etc.

that which is obviously the appropriate thing to

rude - (rood or roo-day) adj.
poor.

Programs badly written or functionally

sacred - adj. Reserved for the exclusive use of something. Usually
refers to memory location or register that shouldn't be used because
what is stored there must not change.
slurp - v. To read a large data file into memory before using or
processing data.
smart - adj.
THING.

Said of a program (or something) that does THE RIGHT

SMOP - n. An acronym for a 'Small Matter Of Programming'. A piece of
code that would not at all be hard to write, but would take a very long
time because of its size. Not worth the trouble.
snail mail - n.

Mail sent via Post Office, rather than electronically.

software rot - n. Hypothetical disease that causes working programs to
stop working when unused for a period of time.
tense - adj. Of programs, very clever and efficient.
programmer produces tense code.
vanilla - adj.

A tense

Standard, usual, or ordinary FLAVOR.

zero - v. 1) To set a bit or variable to zero.
discard all data from.

2) To erase, or

zorch - v. 1) To move quickly. 2) Influences. 3) Energy or ability.
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################

More Related Content

Similar to A short hacker speak glossary(2)

The Rest of the Best
The Rest of the BestThe Rest of the Best
The Rest of the Best
Kevlin Henney
 
Making an Exception
Making an ExceptionMaking an Exception
Making an Exception
Kevlin Henney
 
Oopp Lab Work
Oopp Lab WorkOopp Lab Work
Oopp Lab Work
Heather Dionne
 
Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]
RootedCON
 
Debugging
DebuggingDebugging
Debugging
Olivier Teytaud
 
Mobile Developer Summit 2012, Pune
Mobile Developer Summit 2012, PuneMobile Developer Summit 2012, Pune
Mobile Developer Summit 2012, Pune
Bhuvan Khanna
 
Week 4 Assignment - Software Development PlanScenario-Your team has be.docx
Week 4 Assignment - Software Development PlanScenario-Your team has be.docxWeek 4 Assignment - Software Development PlanScenario-Your team has be.docx
Week 4 Assignment - Software Development PlanScenario-Your team has be.docx
estefana2345678
 
Grounded Pointers
Grounded PointersGrounded Pointers
Grounded Pointers
Andrey Karpov
 
Basics of object oriented programming
Basics of object oriented programmingBasics of object oriented programming
Basics of object oriented programming
Nitin Kumar Kashyap
 
Six of the Best
Six of the BestSix of the Best
Six of the Best
Kevlin Henney
 
DevOps and the Death & Rebirth of Childhood Innocence
DevOps and the Death & Rebirth of Childhood InnocenceDevOps and the Death & Rebirth of Childhood Innocence
DevOps and the Death & Rebirth of Childhood Innocence
Robert Douglass
 
Productive Use of the Apache Spark Prompt with Sam Penrose
Productive Use of the Apache Spark Prompt with Sam PenroseProductive Use of the Apache Spark Prompt with Sam Penrose
Productive Use of the Apache Spark Prompt with Sam Penrose
Databricks
 
Code instrumentation
Code instrumentationCode instrumentation
Code instrumentation
Mennan Tekbir
 
Rx Swift
Rx SwiftRx Swift
Rx Swift
Vincenzo Favara
 
What every C++ programmer should know about modern compilers (w/ comments, AC...
What every C++ programmer should know about modern compilers (w/ comments, AC...What every C++ programmer should know about modern compilers (w/ comments, AC...
What every C++ programmer should know about modern compilers (w/ comments, AC...
Sławomir Zborowski
 
Worse Is Better, for Better or for Worse
Worse Is Better, for Better or for WorseWorse Is Better, for Better or for Worse
Worse Is Better, for Better or for Worse
Kevlin Henney
 
Notes on Simulation and GHDL
Notes on Simulation and GHDLNotes on Simulation and GHDL
Notes on Simulation and GHDL
DIlawar Singh
 
Old Is the New New
Old Is the New NewOld Is the New New
Old Is the New New
Kevlin Henney
 
Pilot Tech Talk #10 — Practical automation by Kamil Cholewiński
Pilot Tech Talk #10 — Practical automation by Kamil CholewińskiPilot Tech Talk #10 — Practical automation by Kamil Cholewiński
Pilot Tech Talk #10 — Practical automation by Kamil Cholewiński
Pilot
 
maXbox Starter 45 Robotics
maXbox Starter 45 RoboticsmaXbox Starter 45 Robotics
maXbox Starter 45 Robotics
Max Kleiner
 

Similar to A short hacker speak glossary(2) (20)

The Rest of the Best
The Rest of the BestThe Rest of the Best
The Rest of the Best
 
Making an Exception
Making an ExceptionMaking an Exception
Making an Exception
 
Oopp Lab Work
Oopp Lab WorkOopp Lab Work
Oopp Lab Work
 
Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]Joxean Koret - Database Security Paradise [Rooted CON 2011]
Joxean Koret - Database Security Paradise [Rooted CON 2011]
 
Debugging
DebuggingDebugging
Debugging
 
Mobile Developer Summit 2012, Pune
Mobile Developer Summit 2012, PuneMobile Developer Summit 2012, Pune
Mobile Developer Summit 2012, Pune
 
Week 4 Assignment - Software Development PlanScenario-Your team has be.docx
Week 4 Assignment - Software Development PlanScenario-Your team has be.docxWeek 4 Assignment - Software Development PlanScenario-Your team has be.docx
Week 4 Assignment - Software Development PlanScenario-Your team has be.docx
 
Grounded Pointers
Grounded PointersGrounded Pointers
Grounded Pointers
 
Basics of object oriented programming
Basics of object oriented programmingBasics of object oriented programming
Basics of object oriented programming
 
Six of the Best
Six of the BestSix of the Best
Six of the Best
 
DevOps and the Death & Rebirth of Childhood Innocence
DevOps and the Death & Rebirth of Childhood InnocenceDevOps and the Death & Rebirth of Childhood Innocence
DevOps and the Death & Rebirth of Childhood Innocence
 
Productive Use of the Apache Spark Prompt with Sam Penrose
Productive Use of the Apache Spark Prompt with Sam PenroseProductive Use of the Apache Spark Prompt with Sam Penrose
Productive Use of the Apache Spark Prompt with Sam Penrose
 
Code instrumentation
Code instrumentationCode instrumentation
Code instrumentation
 
Rx Swift
Rx SwiftRx Swift
Rx Swift
 
What every C++ programmer should know about modern compilers (w/ comments, AC...
What every C++ programmer should know about modern compilers (w/ comments, AC...What every C++ programmer should know about modern compilers (w/ comments, AC...
What every C++ programmer should know about modern compilers (w/ comments, AC...
 
Worse Is Better, for Better or for Worse
Worse Is Better, for Better or for WorseWorse Is Better, for Better or for Worse
Worse Is Better, for Better or for Worse
 
Notes on Simulation and GHDL
Notes on Simulation and GHDLNotes on Simulation and GHDL
Notes on Simulation and GHDL
 
Old Is the New New
Old Is the New NewOld Is the New New
Old Is the New New
 
Pilot Tech Talk #10 — Practical automation by Kamil Cholewiński
Pilot Tech Talk #10 — Practical automation by Kamil CholewińskiPilot Tech Talk #10 — Practical automation by Kamil Cholewiński
Pilot Tech Talk #10 — Practical automation by Kamil Cholewiński
 
maXbox Starter 45 Robotics
maXbox Starter 45 RoboticsmaXbox Starter 45 Robotics
maXbox Starter 45 Robotics
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

A short hacker speak glossary(2)

  • 1. *********************************************************************** This article is being presented through the *StarBoard* Journal of the FlagShip/StarShip SIGs (Special Interest Groups) on Delphi and GEnie telecommunication networks. Permission is hereby granted to non-profit organizations only to reprint this article or pass it along electronically as long as proper credit is given to both the author and the *StarBoard* Journal. *********************************************************************** A Short 'HACKERSPEAK' Glossary A reference to a few of the terms used by many computer hackers. (Researched and compiled by members of the Hollywood User Group) arg - (argh) noun. An argument, in the mathematical sense. automagically - adverb. Automatically, but in a way which, for some reason (for example, because it's too complicated or too trivial) the speaker doesn't feel like explaining. bells and whistles - n. Unnecessary (but often convenient, useful, good-looking, or amusing) features of a program or other object. Added to a bare-bones, working program. bit - n. 1) A unit of information obtained by asking a question (e.g. - 'I need a few bits about Punter protocol') 2) A mental flag; reminder that something should be done eventually. buffer - verb. The act of saving or setting aside something to be done later. (e.g. - 'I'm going to buffer that and go eat now'). bug - n. A problem or mistake; unwanted property or side effect. Usually of a program, but can refer to a person. Can be very simple or very complicated. Antonym: FEATURE. bum - v. To improve something by rearranging or removing its parts. Most often done to a program to increase speed or save memory space, usually at the expense of clarity. buzz - v. Of a program, to run without visible progress or certainty of finishing. Resembles CATATONIA except that a buzzing loop may eventually end. canonical - (ki NAHN i kil) adjective. of doing something. Standard, usual or ordinary way catatonia - n. A condition in which something is supposed to happen, but nothing does. (e.g. - Nothing you type will appear on the screen. It's catatonic. Often means a CRASH has occured.) crash - 1) n. Sudden, drastic failure. Usually refers to a complete computer system or program. 2) v. To fail suddenly or cause to fail. 3) v. Of people, to go to sleep. creeping featurism even more so because the program had this a patchwork program, n. Tendency for anything complicated to become people keep saying, 'Hey, it would be terrific if feature, and could do this, and...' The result is confusing to read, with a lot of 'neat' features. crock - n. Said of a program that works, but in an extremely awkward or cumbersome manner.
  • 2. crunch - v. To process, usually in a time-consuming, complex way. Example: Performing large, repetitive numerical computations is called 'number crunching'. 2) v. To reduce the size of a file (often in a complicated way) to save space. dec'ed out - (decked out) adj. Stoned, drunk (and possibly trying to program, regardless). Uncomplimentary. Derives from the 65-- series ML opcode DECrement, i.e.: decrease a value. elegant - adj. Said of a piece of code that does the RIGHT THING in a way beautiful to look at. feature - n. An extra property or behaviour added to a program that already does the job. May or may not be useful, necessary or convenient. fencepost error - n. A mathematical 'off-by-one' error. Most often found in programs that must count loops (it will count one time too many, or too few). Term comes from the problem: 'If you build a fence 100 feet long with posts 10 feet apart, how many posts fo you need?' Example: Suppose you want to process an array of items x thru y. How many are there? The correct answer is x-y+1 (not x-y, which would be off by one). flavor - n. variety, kind, type. pleasing). (flavorful - adj. flush - v. To scratch, delete or destroy something. superfluous or useless. Aesthetically Often something fudge - v. Perform in an incomplete, but marginally acceptable way. 'I fudged it, so it works.' GC - (jee see) 1) v. To clean up, throw away useless things. 2) To forget. GC is an abreviation of the term 'Garbage Collection', the common method of freeing up memory space. glitch - n. Sudden interruption in electrical service, common sense, or program function. Usually happens only when you pray that it doesn't. grovel - v. detail. To work interminably, examine minutely or in extreme gun - v. To forcibly terminate a program. so I gunned it.' 'It was a boring display, hack - n. An appropriate application of ingenuity. It could be a quick-and-dirty bug fix, or a time-consuming and elegant work of art. A clever technique. hack value - n. The motivation for expending effort and time toward a seemingly pointless goal, the point being the resulting hack. hack attack - n. Period of greatly increased hacking activity. be confused with a Mac-Attack. Not to hacker - n. 1) One who greatly enjoys learning the details of a computer system and how to stretch their capabilities (as opposed to REAL USERS who learn only the minimum amount necessary). 2) One who programs enthusiastically, rather than just theorizing about it. 3) One capable of appreciating HACK VALUE. 4) An expert of any kind 5) A malicious or inquisitive meddler (in the case of a 'system hacker' or a 'password hacker').
  • 3. inc it up - (also 'incing') v. Specifically related to studying, reading, or learning ML. Derives from the 65-- series ML instruction INCrement a value; i.e. increase it. jock - n. Programmer characterized by the large, cumbersome, brute-force programs he/she writes. The programs may work, but slowly, inelegantly, or in an ugly way. kludge - (kloog) 1) n. Clever programming trick, most often to fix a bug. Efficient, but maybe unclear. 2) v. To insert a kludge into a program (to fix a bug or add a feature). magic - adj. Something as yet unexplained or too complex to imagine. M&M's - n. Mental and Midget; i.e. Mental Midget. Uncomplimentary term applied most often to 'system hackers' who intrude for disruptive or destructive purposes (like to crash BBS's). misfeature - n. A FEATURE that eventually turns out to be more trouble than it was worth, possibly because it is inadequate for a new user or situation that has evolved. Misfeatures are different from bugs or side-effects in that they are often more basic to the program design and, at one time, were carefully planned. moby - 1) adj. Immense, complex, or impressive. a computers address space. 2) n. Total size of mode - n. A general state. Examples: DAY MODE - state a person is in when s/he is working days and sleeping nights. mumble - interjection. Said when the correct response is too complicated to put into words or has not been thought out. Can indicate a reluctance to enter a long discussion. mumblage - n. that stuff'. The subject matter of one's mumbling. Replaces 'all nop around (or nopping) - v. Hanging out; not doing much; not programming. Derives from the 65-- series ML instruction code 'NOP' (No OPeration). obie (or o.b.) - n. Derives from a pun with the word 'OverByte'. Usually relates to a ML routine that doesn't work because of some small mistake, possibly an incorrect addressing mode or even a typing error. Most often one or two bytes wrong. patch - 1) n. Piece of code intended as a quick-and-dirty remedy to a BUG or MISFEATURE. 2) v. To fix something temporarily; insert a patch into a piece of code; make the main program machine-specific. punt - v. To give up; decide not to do. rave - v. 1) To persist in discussing something. 2) To speak authoritatively about that which one knows very little. 3) To proselytize. real user - n. A commercial user; a non-hacker who uses computer applications only. Real World, The - n. 1) Places where programs have only business applications. 2) Institutions such as IBM. 3) The location of non-programmers and non-programming activity. The first two definitions are uncomplimentary; the third is not.
  • 4. Right Thing, The - n. use, do, say, etc. that which is obviously the appropriate thing to rude - (rood or roo-day) adj. poor. Programs badly written or functionally sacred - adj. Reserved for the exclusive use of something. Usually refers to memory location or register that shouldn't be used because what is stored there must not change. slurp - v. To read a large data file into memory before using or processing data. smart - adj. THING. Said of a program (or something) that does THE RIGHT SMOP - n. An acronym for a 'Small Matter Of Programming'. A piece of code that would not at all be hard to write, but would take a very long time because of its size. Not worth the trouble. snail mail - n. Mail sent via Post Office, rather than electronically. software rot - n. Hypothetical disease that causes working programs to stop working when unused for a period of time. tense - adj. Of programs, very clever and efficient. programmer produces tense code. vanilla - adj. A tense Standard, usual, or ordinary FLAVOR. zero - v. 1) To set a bit or variable to zero. discard all data from. 2) To erase, or zorch - v. 1) To move quickly. 2) Influences. 3) Energy or ability. ################################################################################ ################################################################################ ################################################################################ ################################################################################ ################################################################################ ################