Search results
Results from the WOW.Com Content Network
The Jargon File is a glossary and usage dictionary of slang used by computer programmers.The original Jargon File was a collection of terms from technical cultures such as the MIT AI Lab, the Stanford AI Lab (SAIL) and others of the old ARPANET AI/LISP/PDP-10 communities, including Bolt, Beranek and Newman (BBN), Carnegie Mellon University, and Worcester Polytechnic Institute.
The New Hacker's Dictionary (editor; MIT Press, ISBN 0-262-68092-0) – printed version of the Jargon File with Raymond listed as the editor. The Cathedral and the Bazaar (O'Reilly; hardcover ISBN 1-56592-724-9, 1999) – includes "The Cathedral and the Bazaar", "Homesteading the Noosphere", "The Magic Cauldron" and "Revenge of the Hackers"
The document described much of the terminology, puns, and culture of the two AI Labs and related research groups, and is the direct predecessor of the Hacker's Dictionary (1983), [13] the first compendium of hacker jargon to be issued by a major publisher .
In 1982, Steele edited The Hacker's Dictionary (Harper & Row, 1983; ISBN 0-06-091082-8), which was a print version of the Jargon File. Steele and Samuel P. Harbison wrote C: A Reference Manual , ( Prentice-Hall , 1984; ISBN 0-13-110016-5 ), to provide a precise description of the language C , which Tartan Laboratories was trying to implement on ...
After contacting the original author by the (now antiquated) means of sending an e-mail to crowther@sitename, where sitename was every host listed on ARPANET, he heard back from William Crowther shortly afterward. Given the go-ahead, Woods proceeded to add enhancements to the Adventure game, and then distributed it on the Internet.
The term "hacker" refers to anyone who breaks into any system, such as a network, website, or database. There are many different types of hacks, including:
Eric S. Raymond, an open-source advocate, restated Conway's law in The New Hacker's Dictionary, a reference work based on the Jargon File. The organization of the software and the organization of the software team will be congruent, he said. Summarizing an example in Conway's paper, Raymond wrote:
Hackers may change the settings in your AOL Mail account to disrupt your inbox or get copies of your emails. Access your mail settings and make sure none of your info or preferences were changed without your knowledge. Things to look for include: • Email filters • Display name • Email signature • Blocked addresses • Mail away message