Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

The New Hacker's Dictionary

.pdf
Скачиваний:
224
Добавлен:
10.08.2013
Размер:
1.62 Mб
Скачать

821

A piece of code or coding technique that takes advantage of the unprotected single-tasking environment in IBM PCs and the like running DOS, e.g., by busy-waiting on a hardware register, direct diddling of screen memory, or using hard timing loops. Compare [10162]ill-behaved, [10163]vaxism, [10164]unixism. Also, `PC-ware' n., a program full of PC-isms on a machine with a more capable operating system. Pejorative.

---

Node:PD, Next:[10165]PDL, Previous:[10166]PC-ism, Up:[10167]= P =

PD /P-D/ adj.

[common] Abbreviation for `public domain', applied to software distributed over [10168]Usenet and from Internet archive sites. Much of this software is not in fact public domain in the legal sense but travels under various copyrights granting reproduction and use rights to anyone who can [10169]snarf a copy. See [10170]copyleft.

---

Node:PDL, Next:[10171]PDP-10, Previous:[10172]PD, Up:[10173]= P =

PDL /P-D-L/, /pid'l/, /p*d'l/ or /puhd'l/

1. n. `Program Design Language'. Any of a large class of formal and profoundly useless pseudo-languages in which [10174]management forces one to design programs. Too often, management expects PDL descriptions to be maintained in parallel with the code, imposing massive overhead to little or no benefit. See also [10175]flowchart. 2. v. To design using a program design language. "I've been pdling so long my eyes won't focus beyond 2 feet." 3. n. `Page Description Language'. Refers to any language which is used to control a graphics device, usually a laserprinter. The most common example is, of course, Adobe's [10176]PostScript language, but there are many others, such as Xerox InterPress, etc. 4. In ITS days, the preferred MITism for [10177]stack. See [10178]overflow pdl. 5. Dave

822

Lebling, one of the co-authors of [10179]Zork; (his [10180]network address on the ITS machines was at one time pdl@dms).

---

Node:PDP-10, Next:[10181]PDP-20, Previous:[10182]PDL, Up:[10183]=

P =

PDP-10 n.

[Programmed Data Processor model 10] The machine that made timesharing real. It looms large in hacker folklore because of its adoption in the mid-1970s by many university computing facilities and research labs, including the MIT AI Lab, Stanford, and CMU. Some aspects of the instruction set (most notably the bit-field instructions) are still considered unsurpassed. The 10 was eventually eclipsed by the VAX machines (descendants of the PDP-11) when [10184]DEC recognized that the 10 and VAX product lines were competing with each other and decided to concentrate its software development effort on the more profitable VAX. The machine was finally dropped from DEC's line in 1983, following the failure of the Jupiter Project at DEC to build a viable new model. (Some attempts by other companies to market clones came to nothing; see [10185]Foonly and [10186]Mars.) This event spelled the doom of [10187]ITS and the technical cultures that had spawned the original Jargon File, but by mid-1991 it had become something of a badge of honorable old-timerhood among hackers to have cut one's teeth on a PDP-10. See [10188]TOPS-10, [10189]ITS, [10190]BLT, [10191]DDT, [10192]DPB, [10193]EXCH, [10194]HAKMEM, [10195]LDB, [10196]pop, [10197]push. See also [10198]http://www.inwap.com/pdp10/.

---

Node:PDP-20, Next:[10199]PEBKAC, Previous:[10200]PDP-10,

Up:[10201]= P =

PDP-20 n.

823

The most famous computer that never was. [10202]PDP-10 computers running the [10203]TOPS-10 operating system were labeled `DECsystem-10' as a way of differentiating them from the PDP-11. Later on, those systems running [10204]TOPS-20 were labeled `DECSYSTEM-20' (the block capitals being the result of a lawsuit brought against DEC by Singer, which once made a computer called `system-10'), but contrary to popular lore there was never a `PDP-20'; the only difference between a 10 and a 20 was the operating system and the color of the paint. Most (but not all) machines sold to run TOPS-10 were painted `Basil Blue', whereas most TOPS-20 machines were painted `Chinese Red' (often mistakenly called orange).

---

Node:PEBKAC, Next:[10205]peek, Previous:[10206]PDP-20,

Up:[10207]= P =

PEBKAC /peb'kak/

[Abbrev., "Problem Exists Between Keyboard And Chair"] Used by support people, particularly at call centers and help desks. Not used with the public. Denotes pilot error as the cause of the crash, especially stupid errors that even a [10208]luser could figure out. Very derogatory. Usage: "Did you ever figure out why that guy couldn't print?" "Yeah, he kept cancelling the operation before it could finish. PEBKAC."

---

Node:peek, Next:[10209]pencil and paper, Previous:[10210]PEBKAC, Up:[10211]= P =

peek n.,vt.

(and [10212]poke) The commands in most microcomputer BASICs for directly accessing memory contents at an absolute address; often extended to mean the corresponding constructs in any [10213]HLL (peek reads

824

memory, poke modifies it). Much hacking on small, non-MMU micros used to consist of `peek'ing around memory, more or less at random, to find the location where the system keeps interesting stuff. Long (and variably accurate) lists of such addresses for various computers circulated (see [10214]interrupt list). The results of `poke's at these addresses may be highly useful, mildly amusing, useless but neat, or (most likely) total [10215]lossage (see [10216]killer poke).

Since a [10217]real operating system provides useful, higher-level services for the tasks commonly performed with peeks and pokes on micros, and real languages tend not to encourage low-level memory groveling, a question like "How do I do a peek in C?" is diagnostic of the [10218]newbie. (Of course, OS kernels often have to do exactly this; a real kernel hacker would unhesitatingly, if unportably, assign an absolute address to a pointer variable and indirect through it.)

---

Node:pencil and paper, Next:[10219]Pentagram Pro,

Previous:[10220]peek, Up:[10221]= P =

pencil and paper n.

An archaic information storage and transmission device that works by depositing smears of graphite on bleached wood pulp. More recent developments in paper-based technology include improved `write-once' update devices which use tiny rolling heads similar to mouse balls to deposit colored pigment. All these devices require an operator skilled at so-called `handwriting' technique. These technologies are ubiquitous outside hackerdom, but nearly forgotten inside it. Most hackers had terrible handwriting to begin with, and years of keyboarding tend to have encouraged it to degrade further. Perhaps for this reason, hackers deprecate pencil-and-paper technology and often resist using it in any but the most trivial contexts.

---

825

Node:Pentagram Pro, Next:[10222]Pentium, Previous:[10223]pencil and paper, Up:[10224]= P =

Pentagram Pro n.

A humorous corruption of "Pentium Pro", with a Satanic reference, implying that the chip is inherently [10225]evil. Often used with "666 MHz"; there is a T-shirt. See [10226]Pentium

---

Node:Pentium, Next:[10227]peon, Previous:[10228]Pentagram Pro,

Up:[10229]= P =

Pentium n.

The name given to Intel's P5 chip, the successor to the 80486. The name was chosen because of difficulties Intel had in trademarking a number. It suggests the number five (implying 586) while (according to Intel) conveying a meaning of strength "like titanium". Among hackers, the plural is frequently `pentia'. See also [10230]Pentagram Pro.

Intel did not stick to this convention when naming its P6 processor the Pentium Pro; many believe this is due to difficulties in selling a chip with "sex" in its name. Successor chips have been called `Pentium II' and `Pentium III'.

---

Node:peon, Next:[10231]percent-S, Previous:[10232]Pentium,

Up:[10233]= P =

peon n.

A person with no special ([10234]root or [10235]wheel) privileges on a computer system. "I can't create an account on foovax for you; I'm only a

826

peon there."

---

Node:percent-S, Next:[10236]perf, Previous:[10237]peon, Up:[10238]= P

=

percent-S /per-sent' es'/ n.

[From the code in C's printf(3) library function used to insert an arbitrary string argument] An unspecified person or object. "I was just talking to some percent-s in administration." Compare [10239]random.

---

Node:perf, Next:[10240]perfect programmer syndrome,

Previous:[10241]percent-S, Up:[10242]= P =

perf /perf/ n.

Syn. [10243]chad (sense 1). The term `perfory' /per'f*-ree/ is also heard. The term [10244]perf may also refer to the perforations themselves, rather than the chad they produce when torn (philatelists use it this way).

---

Node:perfect programmer syndrome, Next:[10245]Perl,

Previous:[10246]perf, Up:[10247]= P =

perfect programmer syndrome n.

Arrogance; the egotistical conviction that one is above normal human error. Most frequently found among programmers of some native ability but relatively little experience (especially new graduates; their perceptions may be distorted by a history of excellent performance at solving [10248]toy problems). "Of course my program is correct, there is no need to test it."

827

"Yes, I can see there may be a problem here, but I'll never type rm -r / while in [10249]root mode."

---

Node:Perl, Next:[10250]person of no account, Previous:[10251]perfect programmer syndrome, Up:[10252]= P =

Perl /perl/ n.

[Practical Extraction and Report Language, a.k.a. Pathologically Eclectic Rubbish Lister] An interpreted language developed by Larry Wall ([10253]<larry@wall.org>, author of patch(1) and rn(1)) and distributed over Usenet. Superficially resembles [10254]awk, but is much hairier, including many facilities reminiscent of sed(1) and shells and a comprehensive Unix system-call interface. Unix sysadmins, who are almost always incorrigible hackers, generally consider it one of the [10255]languages of choice, and it is by far the most widely used tool for making `live' web pages via CGI. Perl has been described, in a parody of a famous remark about lex(1), as the "Swiss-Army chainsaw" of Unix programming. Though Perl is very useful, it would be a stretch to describe it as pretty or [10256]elegant; people who like clean, spare design generally prefer [10257]Python. See also [10258]Camel Book, [10259]TMTOWTDI.

---

Node:person of no account, Next:[10260]pessimal, Previous:[10261]Perl, Up:[10262]= P =

person of no account n.

[University of California at Santa Cruz] Used when referring to a person with no [10263]network address, frequently to forestall confusion. Most often as part of an introduction: "This is Bill, a person of no account, but he used to be bill@random.com". Compare [10264]return from the dead.

828

---

Node:pessimal, Next:[10265]pessimizing compiler,

Previous:[10266]person of no account, Up:[10267]= P =

pessimal /pes'im-l/ adj.

[Latin-based antonym for `optimal'] Maximally bad. "This is a pessimal situation." Also `pessimize' vt. To make as bad as possible. These words are the obvious Latin-based antonyms for `optimal' and `optimize', but for some reason they do not appear in most English dictionaries, although `pessimize' is listed in the OED.

---

Node:pessimizing compiler, Next:[10268]peta-, Previous:[10269]pessimal, Up:[10270]= P =

pessimizing compiler /pes'*-mi:z`ing k*m-pi:l'r/ n.

A compiler that produces object [antonym of techspeak `optimizing compiler'] code that is worse than the straightforward or obvious hand translation. The implication is that the compiler is actually trying to optimize the program, but through excessive cleverness is doing the opposite. A few pessimizing compilers have been written on purpose, however, as pranks or burlesques.

---

Node:peta-, Next:[10271]PETSCII, Previous:[10272]pessimizing compiler, Up:[10273]= P =

peta- /pe't*/ pref

[SI] See [10274]quantifiers.

829

---

Node:PETSCII, Next:[10275]PFY, Previous:[10276]peta-, Up:[10277]= P

=

PETSCII /pet'skee/ n. obs.

[abbreviation of PET ASCII] The variation (many would say perversion) of the [10278]ASCII character set used by the Commodore Business Machines PET series of personal computers and the later Commodore C64, C16, C128, and VIC20 machines. The PETSCII set used left-arrow and up-arrow (as in old-style ASCII) instead of underscore and caret, placed the unshifted alphabet at positions 65-90, put the shifted alphabet at positions 193-218, and added graphics characters.

---

Node:PFY, Next:[10279]phage, Previous:[10280]PETSCII, Up:[10281]= P

=

PFY n.

[Usenet; common] Abbreviation for `Pimply-Faced Youth'. A [10282]BOFH in training, esp. one apprenticed to an elder BOFH aged in evil.

---

Node:phage, Next:[10283]phase, Previous:[10284]PFY, Up:[10285]= P =

phage n.

A program that modifies other programs or databases in unauthorized ways; esp. one that propagates a [10286]virus or [10287]Trojan horse. See also [10288]worm, [10289]mockingbird. The analogy, of course, is with phage viruses in biology.

830

---

Node:phase, Next:[10290]phase of the moon, Previous:[10291]phage, Up:[10292]= P =

phase

1. n. The offset of one's waking-sleeping schedule with respect to the standard 24-hour cycle; a useful concept among people who often work at night and/or according to no fixed schedule. It is not uncommon to change one's phase by as much as 6 hours per day on a regular basis. "What's your phase?" "I've been getting in about 8 P.M. lately, but I'm going to [10293]wrap around to the day schedule by Friday." A person who is roughly 12 hours out of phase is sometimes said to be in `night mode'. (The term `day mode' is also (but less frequently) used, meaning you're working 9 to 5 (or, more likely, 10 to 6).) The act of altering one's cycle is called `changing phase'; `phase shifting' has also been recently reported from Caltech. 2. `change phase the hard way': To stay awake for a very long time in order to get into a different phase. 3. `change phase the easy way': To stay asleep, etc. However, some claim that either staying awake longer or sleeping longer is easy, and that it is shortening your day or night that is really hard (see [10294]wrap around). The `jet lag' that afflicts travelers who cross many time-zone boundaries may be attributed to two distinct causes: the strain of travel per se, and the strain of changing phase. Hackers who suddenly find that they must change phase drastically in a short period of time, particularly the hard way, experience something very like jet lag without traveling.

---

Node:phase of the moon, Next:[10295]phase-wrapping,

Previous:[10296]phase, Up:[10297]= P =

phase of the moon n.

Соседние файлы в предмете Английский язык