Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

The New Hacker's Dictionary

.pdf
Скачиваний:
224
Добавлен:
10.08.2013
Размер:
1.62 Mб
Скачать

301

Node:cup holder, Next:[3377]cursor dipped in X, Previous:[3378]cubing, Up:[3379]= C =

cup holder n.

The tray of a CD-ROM drive, or by extension the CD drive itself. So called because of a common tech support legend about the idiot who called to complain that the cup holder on his computer broke. A joke program was once distributed around the net called "cupholder.exe", which when run simply extended the CD drive tray. The humor of this was of course lost on people whose drive had a slot or a caddy instead.

---

Node:cursor dipped in X, Next:[3380]cuspy, Previous:[3381]cup holder, Up:[3382]= C =

cursor dipped in X n.

There are a couple of metaphors in English of the form `pen dipped in X' (perhaps the most common values of X are `acid', `bile', and `vitriol'). These map over neatly to this hackish usage (the cursor being what moves, leaving letters behind, when one is composing on-line). "Talk about a [3383]nastygram! He must've had his cursor dipped in acid when he wrote that one!"

---

Node:cuspy, Next:[3384]cut a tape, Previous:[3385]cursor dipped in X, Up:[3386]= C =

cuspy /kuhs'pee/ adj.

[WPI: from the [3387]DEC abbreviation CUSP, for `Commonly Used System Program', i.e., a utility program used by many people] 1. (of a program) Well-written. 2. Functionally excellent. A program that performs

302

well and interfaces well to users is cuspy. See [3388]rude. 3. [NYU] Said of an attractive woman, especially one regarded as available. Implies a certain curvaceousness.

---

Node:cut a tape, Next:[3389]cybercrud, Previous:[3390]cuspy, Up:[3391]= C =

cut a tape vi.

To write a software or document distribution on magnetic tape for shipment. Has nothing to do with physically cutting the medium! Early versions of this lexicon claimed that one never analogously speaks of `cutting a disk', but this has since been reported as live usage. Related slang usages are mainstream business's `cut a check', the recording industry's `cut a record', and the military's `cut an order'.

All of these usages reflect physical processes in obsolete recording and duplication technologies. The first stage in manufacturing an old-style vinyl record involved cutting grooves in a stamping die with a precision lathe. More mundanely, the dominant technology for mass duplication of paper documents in pre-photocopying days involved "cutting a stencil", punching away portions of the wax overlay on a silk screen. More directly, paper tape with holes punched in it was an important early storage medium.

---

Node:cybercrud, Next:[3392]cyberpunk, Previous:[3393]cut a tape, Up:[3394]= C =

cybercrud /si:'ber-kruhd/ n.

1. [coined by Ted Nelson] Obfuscatory tech-talk. Verbiage with a high [3395]MEGO factor. The computer equivalent of bureaucratese. 2. Incomprehensible stuff embedded in email. First there were the "Received"

303

headers that show how mail flows through systems, then MIME (Multi-purpose Internet Mail Extensions) headers and part boundaries, and now huge blocks of radix-64 for PEM (Privacy Enhanced Mail) or PGP (Pretty Good Privacy) digital signatures and certificates of authenticity. This stuff all services a purpose and good user interfaces should hide it, but all too often users are forced to wade through it.

---

Node:cyberpunk, Next:[3396]cyberspace, Previous:[3397]cybercrud,

Up:[3398]= C =

cyberpunk /si:'ber-puhnk/ n.,adj.

[orig. by SF writer Bruce Bethke and/or editor Gardner Dozois] A subgenre of SF launched in 1982 by William Gibson's epoch-making novel "Neuromancer" (though its roots go back through Vernor Vinge's "True Names" (see the [3399]Bibliography in Appendix C) to John Brunner's 1975 novel "The Shockwave Rider"). Gibson's near-total ignorance of computers and the present-day hacker culture enabled him to speculate about the role of computers and hackers in the future in ways hackers have since found both irritatingly na•ve and tremendously stimulating. Gibson's work was widely imitated, in particular by the short-lived but innovative "Max Headroom" TV series. See [3400]cyberspace, [3401]ice, [3402]jack in, [3403]go flatline.

Since 1990 or so, popular culture has included a movement or fashion trend that calls itself `cyberpunk', associated especially with the rave/techno subculture. Hackers have mixed feelings about this. On the one hand, self-described cyberpunks too often seem to be shallow trendoids in black leather who have substituted enthusiastic blathering about technology for actually learning and doing it. Attitude is no substitute for competence. On the other hand, at least cyberpunks are excited about the right things and properly respectful of hacking talent in those who have it. The general consensus is to tolerate them politely in hopes that they'll attract people who grow into being true hackers.

304

---

Node:cyberspace, Next:[3404]cycle, Previous:[3405]cyberpunk,

Up:[3406]= C =

cyberspace /si:'br-spays`/ n.

1.Notional `information-space' loaded with visual cues and navigable with brain-computer interfaces called `cyberspace decks'; a characteristic prop of [3407]cyberpunk SF. Serious efforts to construct [3408]virtual reality interfaces modeled explicitly on Gibsonian cyberspace are under way, using more conventional devices such as glove sensors and binocular TV headsets. Few hackers are prepared to deny outright the possibility of a cyberspace someday evolving out of the network (see [3409]the network).

2.The Internet or [3410]Matrix (sense #2) as a whole, considered as a crude cyberspace (sense 1). Although this usage became widely popular in the mainstream press during 1994 when the Internet exploded into public awareness, it is strongly deprecated among hackers because the Internet does not meet the high, SF-inspired standards they have for true cyberspace technology. Thus, this use of the term usually tags a [3411]wannabee or outsider. Oppose [3412]meatspace. 3. Occasionally, the metaphoric location of the mind of a person in [3413]hack mode. Some hackers report experiencing strong eidetic imagery when in hack mode; interestingly, independent reports from multiple sources suggest that there are common features to the experience. In particular, the dominant colors of this subjective `cyberspace' are often gray and silver, and the imagery often involves constellations of marching dots, elaborate shifting patterns of lines and angles, or moire patterns.

---

Node:cycle, Next:[3414]cycle crunch, Previous:[3415]cyberspace, Up:[3416]= C =

cycle

305

1. n. The basic unit of computation. What every hacker wants more of (noted hacker Bill Gosper described himself as a "cycle junkie"). One can describe an instruction as taking so many `clock cycles'. Often the computer can access its memory once on every clock cycle, and so one speaks also of `memory cycles'. These are technical meanings of [3417]cycle. The jargon meaning comes from the observation that there are only so many cycles per second, and when you are sharing a computer the cycles get divided up among the users. The more cycles the computer spends working on your program rather than someone else's, the faster your program will run. That's why every hacker wants more cycles: so he can spend less time waiting for the computer to respond. 2. By extension, a notional unit of human thought power, emphasizing that lots of things compete for the typical hacker's think time. "I refused to get involved with the Rubik's Cube back when it was big. Knew I'd burn too many cycles on it if I let myself." 3. vt. Syn. [3418]bounce (sense 4), [3419]120 reset; from the phrase `cycle power'. "Cycle the machine again, that serial port's still hung."

---

Node:cycle crunch, Next:[3420]cycle drought, Previous:[3421]cycle, Up:[3422]= C =

cycle crunch n.,obs.

A situation wherein the number of people trying to use a computer simultaneously has reached the point where no one can get enough cycles because they are spread too thin and the system has probably begun to [3423]thrash. This scenario is an inevitable result of Parkinson's Law applied to timesharing. Usually the only solution is to buy more computer. Happily, this has rapidly become easier since the mid-1980s, so much so that the very term `cycle crunch' now has a faintly archaic flavor; most hackers now use workstations or personal computers as opposed to traditional timesharing systems, and are far more likely to complain of `bandwidth crunch' on their shared networks rather than cycle crunch.

306

---

Node:cycle drought, Next:[3424]cycle of reincarnation,

Previous:[3425]cycle crunch, Up:[3426]= C =

cycle drought n.

A scarcity of cycles. It may be due to a [3427]cycle crunch, but it could also occur because part of the computer is temporarily not working, leaving fewer cycles to go around. "The [3428]high moby is [3429]down, so we're running with only half the usual amount of memory. There will be a cycle drought until it's fixed."

---

Node:cycle of reincarnation, Next:[3430]cycle server, Previous:[3431]cycle drought, Up:[3432]= C =

cycle of reincarnation n.

See [3433]wheel of reincarnation.

---

Node:cycle server, Next:[3434]cypherpunk, Previous:[3435]cycle of reincarnation, Up:[3436]= C =

cycle server n.

A powerful machine that exists primarily for running large compute-, disk-, or memory-intensive jobs (more formally called a `compute server'). Implies that interactive tasks such as editing are done on other machines on the network, such as workstations.

---

307

Node:cypherpunk, Next:[3437]C|N>K, Previous:[3438]cycle server, Up:[3439]= C =

cypherpunk n.

[from [3440]cyberpunk] Someone interested in the uses of encryption via electronic ciphers for enhancing personal privacy and guarding against tyranny by centralized, authoritarian power structures, especially government. There is an active cypherpunks mailing list at [3441]cypherpunks-request@toad.com coordinating work on public-key encryption freeware, privacy, and digital cash. See also [3442]tentacle.

---

Node:C|N>K, Next:[3443]D. C. Power Lab, Previous:[3444]cypherpunk,

Up:[3445]= C =

C|N>K n.

[Usenet] Coffee through Nose to Keyboard; that is, "I laughed so hard I [3446]snarfed my coffee onto my keyboard.". Common on alt.fan.pratchett and [3447]scary devil monastery; recognized elsewhere. The [3448]Acronymphomania FAQ on alt.fan.pratchett recognizes variants such as T|N>K = `Tea through Nose to Keyboard' and C|N>S = `Coffee through Nose to Screen'.

---

Node:= D =, Next:[3449]= E =, Previous:[3450]= C =, Up:[3451]The Jargon Lexicon

= D =

* [3452]D. C. Power Lab:

* [3453]daemon:

308

*[3454]daemon book:

*[3455]dahmum:

*[3456]dancing frog:

*[3457]dangling pointer:

*[3458]dark-side hacker:

*[3459]Datamation:

*[3460]DAU:

*[3461]Dave the Resurrector:

*[3462]day mode:

*[3463]dd:

*[3464]DDT:

*[3465]de-rezz:

*[3466]dead:

*[3467]dead beef attack:

*[3468]dead code:

*[3469]dead link:

*[3470]DEADBEEF:

*[3471]deadlock:

309

*[3472]deadly embrace:

*[3473]death code:

*[3474]Death Square:

*[3475]Death Star:

*[3476]DEC:

*[3477]DEC:

*[3478]DEC Wars:

*[3479]decay:

*[3480]deckle:

*[3481]DED:

*[3482]deep hack mode:

*[3483]deep magic:

*[3484]deep space:

*[3485]defenestration:

*[3486]defined as:

*[3487]dehose:

*[3488]deletia:

*[3489]deliminator:

310

*[3490]delint:

*[3491]delta:

*[3492]demented:

*[3493]demigod:

*[3494]demo:

*[3495]demo mode:

*[3496]demoeffect:

*[3497]demogroup:

*[3498]demon:

*[3499]demon dialer:

*[3500]demoparty:

*[3501]demoscene:

*[3502]dentro:

*[3503]depeditate:

*[3504]deprecated:

*[3505]derf:

*[3506]deserves to lose:

*[3507]desk check:

Соседние файлы в предмете Английский язык