This page contains affiliate links. As Amazon Associates we earn from qualifying purchases.
Writers:
Language:
Form:
Genre:
Published:
  • 20/8/2000
Edition:
Collection:
Tags:
FREE Audible 30 days

(see also [4090]tree-killer). Hackers seldom read paper documentation and (too) often resist writing it; they prefer theirs to be terse and on-line. A common comment on this predilection is “You can’t [4091]grep dead trees”. See [4092]drool-proof paper, [4093]verbiage, [4094]treeware.
_________________________________________________________________
Node:dodgy, Next:[4095]dogcow, Previous:[4096]documentation, Up:[4097]= D =

dodgy adj.

Syn. with [4098]flaky. Preferred outside the U.S. _________________________________________________________________
Node:dogcow, Next:[4099]dogfood, Previous:[4100]dodgy, Up:[4101]= D =
dogcow /dog’kow/ n.

See [4102]Moof. The dogcow is a semi-legendary creature that lurks in the depths of the Macintosh Technical Notes Hypercard stack V3.1. The full story of the dogcow is told in technical note #31 (the particular dogcow illustrated is properly named `Clarus’). Option-shift-click will cause it to emit a characteristic `Moof!’ or `!fooM’ sound. Getting to tech note 31 is the hard part; to discover how to do that, one must needs examine the stack script with a hackerly eye. Clue: [4103]rot13 is involved. A dogcow also appears if you choose `Page Setup…’ with a LaserWriter selected and click on the `Options’ button. It also lurks in other Mac printer drivers, notably those for the now-discontinued Style Writers. Sadly, Apple has removed the pages that used to describe the dogcow.
_________________________________________________________________
Node:dogfood, Next:[4104]dogpile, Previous:[4105]dogcow, Up:[4106]= D =

dogfood n.

[Microsoft, Netscape] Interim software used internally for testing. “To eat one’s own dogfood” (from which the slang noun derives) means to use the software one is developing, as part of one’s everyday development environment (the phrase is used outside Microsoft and Netscape). The practice is normal in the Linux community and elsewhere, but the term `dogfood’ is seldom used as open-source betas tend to be quite tasty and nourishing. The idea is that developers who are using their own software will quickly learn what’s missing or broken. Dogfood is typically not even of [4107]beta quality. _________________________________________________________________
Node:dogpile, Next:[4108]dogwash, Previous:[4109]dogfood, Up:[4110]= D =

dogpile v.

[Usenet: prob. fr. mainstream “puppy pile”] When many people post unfriendly responses in short order to a single posting, they are sometimes said to “dogpile” or “dogpile on” the person to whom they’re responding. For example, when a religious missionary posts a simplistic appeal to alt.atheism, he can expect to be dogpiled. It has been suggested that this derives from U.S, football slang for a tackle involving three or more people; among hackers, it seems at least as likely do derive from an `autobiographical’ Bugs Bunny cartoon in which a gang of attacking canines actually yells “Dogpile on the rabbit!”.
_________________________________________________________________
Node:dogwash, Next:[4111]domainist, Previous:[4112]dogpile, Up:[4113]= D =

dogwash /dog’wosh/

[From a quip in the `urgency’ field of a very optional software change request, ca. 1982. It was something like “Urgency: Wash your dog first”.] 1. n. A project of minimal priority, undertaken as an escape from more serious work. 2. v. To engage in such a project. Many games and much [4114]freeware get written this way. _________________________________________________________________
Node:domainist, Next:[4115]Don’t do that then!, Previous:[4116]dogwash, Up:[4117]= D =
domainist /doh-mayn’ist/ adj.

1. [Usenet, by pointed analogy with “sexist”, “racist”, etc.] Someone who judges people by the domain of their email addresses; esp. someone who dismisses anyone who posts from a public internet provider. “What do you expect from an article posted from aol.com?” 2. Said of an [4118]Internet address (as opposed to a [4119]bang path) because the part to the right of the @ specifies a nested series of `domains’; for example, [4120]esr@snark.thyrsus.com specifies the machine called snark in the subdomain called thyrsus within the top-level domain called com. See also [4121]big-endian, sense 2.
The meaning of this term has drifted. At one time sense 2 was primary. In elder days it was also used of a site, mailer, or routing program which knew how to handle domainist addresses; or of a person (esp. a site admin) who preferred domain addressing, supported a domainist mailer, or proselytized for domainist addressing and disdained [4122]bang paths. These senses are now (1996) obsolete, as effectively all sites have converted.
_________________________________________________________________
Node:Don’t do that then!, Next:[4123]dongle, Previous:[4124]domainist, Up:[4125]= D =

Don’t do that then! imp.

[from an old doctor’s office joke about a patient with a trivial complaint] Stock response to a user complaint. “When I type control-S, the whole system comes to a halt for thirty seconds.” “Don’t do that, then!” (or “So don’t do that!”). Compare [4126]RTFM.
Here’s a classic example of “Don’t do that then!” from Neil Stephenson’s “In The Beginning Was The Command Line”. A friend of his built a network with a load of Macs and a few high-powered database servers. He found that from time to time the whole network would lock up for no apparent reason. The problem was eventually tracked down to MacOS’s cooperative multitasking: when a user held down the mouse button for too long, the network stack wouldn’t get a chance to run… _________________________________________________________________
Node:dongle, Next:[4127]dongle-disk, Previous:[4128]Don’t do that then!, Up:[4129]= D =

dongle /dong’gl/ n.

1. [now obs.] A security or [4130]copy protection device for proprietary software consisting of a serialized EPROM and some drivers in a D-25 connector shell, which must be connected to an I/O port of the computer while the program is run. Programs that use a dongle query the port at startup and at programmed intervals thereafter, and terminate if it does not respond with the dongle’s programmed validation code. Thus, users can make as many copies of the program as they want but must pay for each dongle. The idea was clever, but it was initially a failure, as users disliked tying up a serial port this way. By 1993, dongles would typically pass data through the port and monitor for [4131]magic codes (and combinations of status lines) with minimal if any interference with devices further down the line — this innovation was necessary to allow daisy-chained dongles for multiple pieces of software. These devices have become rare as the industry has moved away from copy-protection schemes in general. 2. By extension, any physical electronic key or transferable ID required for a program to function. Common variations on this theme have used parallel or even joystick ports. See [4132]dongle-disk. 3. An adaptor cable mating a special edge-type connector on a PCMCIA or on-board Ethernet card to a standard RJ45 Ethernet jack. This usage seems to have surfaced in 1999 and is now dominant. Laptop owners curse these things because they’re notoriously easy to lose and the vendors commonly charge extortionate prices for replacements.

[Note: in early 1992, advertising copy from Rainbow Technologies (a manufacturer of dongles) included a claim that the word derived from “Don Gall”, allegedly the inventor of the device. The company’s receptionist will cheerfully tell you that the story is a myth invented for the ad copy. Nevertheless, I expect it to haunt my life as a lexicographer for at least the next ten years. 🙁 –ESR] _________________________________________________________________
Node:dongle-disk, Next:[4133]donuts, Previous:[4134]dongle, Up:[4135]= D =

dongle-disk /don’gl disk/ n.

A special floppy disk that is required in order to perform some task. Some contain special coding that allows an application to identify it uniquely, others are special code that does something that normally-resident programs don’t or can’t. (For example, AT&T’s “Unix PC” would only come up in [4136]root mode with a special boot disk.) Also called a `key disk’. See [4137]dongle. _________________________________________________________________
Node:donuts, Next:[4138]doorstop, Previous:[4139]dongle-disk, Up:[4140]= D =

donuts n. obs.

A collective noun for any set of memory bits. This usage is extremely archaic and may no longer be live jargon; it dates from the days of ferrite-[4141]core memories in which each bit was implemented by a doughnut-shaped magnetic flip-flop.
_________________________________________________________________
Node:doorstop, Next:[4142]DoS attack, Previous:[4143]donuts, Up:[4144]= D =

doorstop n.

Used to describe equipment that is non-functional and halfway expected to remain so, especially obsolete equipment kept around for political reasons or ostensibly as a backup. “When we get another Wyse-50 in here, that ADM 3 will turn into a doorstop.” Compare [4145]boat anchor.
_________________________________________________________________
Node:DoS attack, Next:[4146]dot file, Previous:[4147]doorstop, Up:[4148]= D =

DoS attack //

[Usenet,common; note that it’s unrelated to `DOS’ as name of an operating system] Abbreviation for Denial-Of-Service attack. This abbreviation is most often used of attempts to shut down newsgroups with floods of [4149]spam, or to flood network links with large amounts of traffic, or to flood network links with large amounts of traffic, often by abusing network broadcast addresses Compare [4150]slashdot effect.
_________________________________________________________________
Node:dot file, Next:[4151]double bucky, Previous:[4152]DoS attack, Up:[4153]= D =

dot file [Unix] n.

A file that is not visible by default to normal directory-browsing tools (on Unix, files named with a leading dot are, by convention, not normally presented in directory listings). Many programs define one or more dot files in which startup or configuration information may be optionally recorded; a user can customize the program’s behavior by creating the appropriate file in the current or home directory. (Therefore, dot files tend to [4154]creep — with every nontrivial application program defining at least one, a user’s home directory can be filled with scores of dot files, of course without the user’s really being aware of it.) See also [4155]profile (sense 1), [4156]rc file.
_________________________________________________________________
Node:double bucky, Next:[4157]doubled sig, Previous:[4158]dot file, Up:[4159]= D =

double bucky adj.

Using both the CTRL and META keys. “The command to burn all LEDs is double bucky F.”

This term originated on the Stanford extended-ASCII keyboard, and was later taken up by users of the [4160]space-cadet keyboard at MIT. A typical MIT comment was that the Stanford [4161]bucky bits (control and meta shifting keys) were nice, but there weren’t enough of them; you could type only 512 different characters on a Stanford keyboard. An obvious way to address this was simply to add more shifting keys, and this was eventually done; but a keyboard with that many shifting keys is hard on touch-typists, who don’t like to move their hands away from the home position on the keyboard. It was half-seriously suggested that the extra shifting keys be implemented as pedals; typing on such a keyboard would be very much like playing a full pipe organ. This idea is mentioned in a parody of a very fine song by Jeffrey Moss called “Rubber Duckie”, which was published in “The Sesame Street Songbook” (Simon and Schuster 1971, ISBN 0-671-21036-X). These lyrics were written on May 27, 1978, in celebration of the Stanford keyboard:
Double Bucky

Double bucky, you’re the one!
You make my keyboard lots of fun. Double bucky, an additional bit or two: (Vo-vo-de-o!)
Control and meta, side by side, Augmented ASCII, nine bits wide!
Double bucky! Half a thousand glyphs, plus a few! Oh,
I sure wish that I
Had a couple of
Bits more!
Perhaps a
Set of pedals to
Make the number of
Bits four:
Double double bucky!
Double bucky, left and right
OR’d together, outta sight!
Double bucky, I’d like a whole word of Double bucky, I’m happy I heard of Double bucky, I’d like a whole word of you!

— The Great Quux (with apologies to Jeffrey Moss)

[This, by the way, is an excellent example of computer [4162]filk –ESR] See also [4163]meta bit, [4164]cokebottle, and [4165]quadruple bucky.
_________________________________________________________________
Node:doubled sig, Next:[4166]down, Previous:[4167]double bucky, Up:[4168]= D =

doubled sig [Usenet] n.

A [4169]sig block that has been included twice in a [4170]Usenet article or, less commonly, in an electronic mail message. An article or message with a doubled sig can be caused by improperly configured software. More often, however, it reveals the author’s lack of experience in electronic communication. See [4171]B1FF, [4172]pseudo. _________________________________________________________________
Node:down, Next:[4173]download, Previous:[4174]doubled sig, Up:[4175]= D =

down

1. adj. Not operating. “The up escalator is down” is considered a humorous thing to say (unless of course you were expecting to use it), and “The elevator is down” always means “The elevator isn’t working” and never refers to what floor the elevator is on. With respect to computers, this term has passed into the mainstream; the extension to other kinds of machine is still confined to techies (e.g. boiler mechanics may speak of a boiler being down). 2. `go down’ vi. To stop functioning; usually said of the [4176]system. The message from the [4177]console that every hacker hates to hear from the operator is “System going down in 5 minutes”. 3. `take down’, `bring down’ vt. To deactivate purposely, usually for repair work or [4178]PM. “I’m taking the system down to work on that bug in the tape drive.” Occasionally one hears the word `down’ by itself used as a verb in this vt. sense. See [4179]crash; oppose [4180]up.
_________________________________________________________________
Node:download, Next:[4181]DP, Previous:[4182]down, Up:[4183]= D =
download vt.

To transfer data or (esp.) code from a far-away system (especially a larger `host’ system) over a digital communications link to a nearby system (especially a smaller `client’ system. Oppose [4184]upload.
Historical use of these terms was at one time associated with transfers from large timesharing machines to PCs or peripherals (download) and vice-versa (upload). The modern usage relative to the speaker (rather than as an indicator of the size and role of the machines) evolved as machine categories lost most of their former functional importance.
_________________________________________________________________
Node:DP, Next:[4185]DPB, Previous:[4186]download, Up:[4187]= D =
DP /D-P/ n.

1. Data Processing. Listed here because, according to hackers, use of the term marks one immediately as a [4188]suit. See [4189]DPer. 2. Common abbrev for [4190]Dissociated Press. _________________________________________________________________
Node:DPB, Next:[4191]DPer, Previous:[4192]DP, Up:[4193]= D =
DPB /d*-pib’/ vt.

[from the PDP-10 instruction set] To plop something down in the middle. Usage: silly. “DPB yourself into that couch there.” The connotation would be that the couch is full except for one slot just big enough for one last person to sit in. DPB means `DePosit Byte’, and was the name of a PDP-10 instruction that inserts some bits into the middle of some other bits. Hackish usage has been kept alive by the Common LISP function of the same name. _________________________________________________________________
Node:DPer, Next:[4194]Dr. Fred Mbogo, Previous:[4195]DPB, Up:[4196]= D =

DPer /dee-pee-er/ n.

Data Processor. Hackers are absolutely amazed that [4197]suits use this term self-referentially. Computers process data, not people! See [4198]DP.
_________________________________________________________________
Node:Dr. Fred Mbogo, Next:[4199]dragon, Previous:[4200]DPer, Up:[4201]= D =

Dr. Fred Mbogo /*m-boh’goh, dok’tr fred/ n.
[Stanford] The archetypal man you don’t want to see about a problem, esp. an incompetent professional; a shyster. “Do you know a good eye doctor?” “Sure, try Mbogo Eye Care and Professional Dry Cleaning.” The name comes from synergy between [4202]bogus and the original Dr. Mbogo, a witch doctor who was Gomez Addams’ physician on the old “Addams Family” TV show. Interestingly enough, it turns out that under the rules for Swahili noun classes, `m-‘ is the characteristic prefix of “nouns referring to human beings”. As such, “mbogo” is quite plausible as a Swahili coinage for a person having the nature of a [4203]bogon. Compare [4204]Bloggs Family and [4205]J. Random Hacker; see also [4206]Fred Foobar and [4207]fred. _________________________________________________________________
Node:dragon, Next:[4208]Dragon Book, Previous:[4209]Dr. Fred Mbogo, Up:[4210]= D =

dragon n.

[MIT] A program similar to a [4211]daemon, except that it is not invoked at all, but is instead used by the system to perform various secondary tasks. A typical example would be an accounting program, which keeps track of who is logged in, accumulates load-average statistics, etc. Under ITS, many terminals displayed a list of people logged in, where they were, what they were running, etc., along with some random picture (such as a unicorn, Snoopy, or the Enterprise), which was generated by the `name dragon’. Usage: rare outside MIT — under Unix and most other OSes this would be called a `background demon’ or [4212]daemon. The best-known Unix example of a dragon is cron(1). At SAIL, they called this sort of thing a `phantom’. _________________________________________________________________
Node:Dragon Book, Next:[4213]drain, Previous:[4214]dragon, Up:[4215]= D =

Dragon Book n.

The classic text “Compilers: Principles, Techniques and Tools”, by Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman (Addison-Wesley 1986; ISBN 0-201-10088-6), so called because of the cover design featuring a dragon labeled `complexity of compiler design’ and a knight bearing the lance `LALR parser generator’ among his other trappings. This one is more specifically known as the `Red Dragon Book’ (1986); an earlier edition, sans Sethi and titled “Principles Of Compiler Design” (Alfred V. Aho and Jeffrey D. Ullman; Addison-Wesley, 1977; ISBN 0-201-00022-9), was the `Green Dragon Book’ (1977). (Also `New Dragon Book’, `Old Dragon Book’.) The horsed knight and the Green Dragon were warily eying each other at a distance; now the knight is typing (wearing gauntlets!) at a terminal showing a video-game representation of the Red Dragon’s head while the rest of the beast extends back in normal space. See also [4216]book titles. _________________________________________________________________
Node:drain, Next:[4217]dread high-bit disease, Previous:[4218]Dragon Book, Up:[4219]= D =

drain v.

[IBM] Syn. for [4220]flush (sense 2). Has a connotation of finality about it; one speaks of draining a device before taking it offline. _________________________________________________________________
Node:dread high-bit disease, Next:[4221]Dread Questionmark Disease, Previous:[4222]drain, Up:[4223]= D =

dread high-bit disease n.

A condition endemic to some now-obsolete computers and peripherals (including ASR-33 teletypes and PRIME minicomputers) that results in all characters having their high (0x80) bit forced on. This of course makes transporting files to other systems much more difficult, not to mention the problems these machines have talking with true 8-bit devices.

This term was originally used specifically of PRIME (a.k.a. PR1ME) minicomputers. Folklore has it that PRIME adopted the reversed-8-bit convention in order to save 25 cents per serial line per machine; PRIME old-timers, on the other hand, claim they inherited the disease from Honeywell via customer NASA’s compatibility requirements and struggled heroically to cure it. Whoever was responsible, this probably qualifies as one of the most [4224]cretinous design tradeoffs ever made. See [4225]meta bit.
_________________________________________________________________
Node:Dread Questionmark Disease, Next:[4226]DRECNET, Previous:[4227]dread high-bit disease, Up:[4228]= D =
Dread Questionmark Disease

n. The result of saving HTML from Microsoft Word or some other program that uses the nonstandard Microsoft variant of Latin-1; the symptom is that various of those nonstandard characters in positions 128-160 show up as questionmarks. The usual culprit is the misnamed `smart quotes’ feature in Microsoft Word. For more details (and a program called `demoroniser’ that cleans up the mess) see [4229]http://www.fourmilab.ch/webtools/demoroniser/. _________________________________________________________________
Node:DRECNET, Next:[4230]driver, Previous:[4231]Dread Questionmark Disease, Up:[4232]= D =

DRECNET /drek’net/ n.

[from Yiddish/German `dreck’, meaning filth] Deliberate distortion of DECNET, a networking protocol used in the [4233]VMS community. So called because [4234]DEC helped write the Ethernet specification and then (either stupidly or as a malignant customer-control tactic) violated that spec in the design of DRECNET in a way that made it incompatible. See also [4235]connector conspiracy. _________________________________________________________________
Node:driver, Next:[4236]droid, Previous:[4237]DRECNET, Up:[4238]= D =
driver n.

1. The [4239]main loop of an event-processing program; the code that gets commands and dispatches them for execution. 2. [techspeak] In `device driver’, code designed to handle a particular peripheral device such as a magnetic disk or tape unit. 3. In the TeX world and the computerized typesetting world in general, a program that translates some device-independent or other common format to something a real device can actually understand. _________________________________________________________________
Node:droid, Next:[4240]drone, Previous:[4241]driver, Up:[4242]= D =
droid n.

[from `android’, SF terminology for a humanoid robot of essentially biological (as opposed to mechanical/electronic) construction] A person (esp. a low-level bureaucrat or service-business employee) exhibiting most of the following characteristics: (a) naive trust in the wisdom of the parent organization or `the system’; (b) a blind-faith propensity to believe obvious nonsense emitted by authority figures (or computers!); (c) a rule-governed mentality, one unwilling or unable to look beyond the `letter of the law’ in exceptional situations; (d) a paralyzing fear of official reprimand or worse if Procedures are not followed No Matter What; and (e) no interest in doing anything above or beyond the call of a very narrowly-interpreted duty, or in particular in fixing that which is broken; an “It’s not my job, man” attitude.
Typical droid positions include supermarket checkout assistant and bank clerk; the syndrome is also endemic in low-level government employees. The implication is that the rules and official procedures constitute software that the droid is executing; problems arise when the software has not been properly debugged. The term `droid mentality’ is also used to describe the mindset behind this behavior. Compare [4243]suit, [4244]marketroid; see [4245]-oid.
In England there is equivalent mainstream slang; a `jobsworth’ is an obstructive, rule-following bureaucrat, often of the uniformed or suited variety. Named for the habit of denying a reasonable request by sucking his teeth and saying “Oh no, guv, sorry I can’t help you: that’s more than my job’s worth”.
_________________________________________________________________
Node:drone, Next:[4246]drool-proof paper, Previous:[4247]droid, Up:[4248]= D =

drone n.

Ignorant sales or customer service personnel in computer or electronics superstores. Characterized by a lack of even superficial knowledge about the products they sell, yet possessed of the conviction that they are more competent than their hacker customers. Usage: “That video board probably sucks, it was recommended by a drone at Fry’s” In the year 2000, their natural habitats include Fry’s Electronics, Best Buy, and CompUSA.
_________________________________________________________________
Node:drool-proof paper, Next:[4249]drop on the floor, Previous:[4250]drone, Up:[4251]= D =

drool-proof paper n.

Documentation that has been obsessively [4252]dumbed down, to the point where only a [4253]cretin could bear to read it, is said to have succumbed to the `drool-proof paper syndrome’ or to have been `written on drool-proof paper’. For example, this is an actual quote from Apple’s LaserWriter manual: “Do not expose your LaserWriter to open fire or flame.” The SGI Indy manual is said to include the line “Do not dangle the mouse by the cord or throw it at coworkers.”, but this sounds like parody.
_________________________________________________________________
Node:drop on the floor, Next:[4254]drop-ins, Previous:[4255]drool-proof paper, Up:[4256]= D =
drop on the floor vt.

To react to an error condition by silently discarding messages or other valuable data. “The gateway ran out of memory, so it just started dropping packets on the floor.” Also frequently used of faulty mail and netnews relay sites that lose messages. See also [4257]black hole, [4258]bit bucket.
_________________________________________________________________
Node:drop-ins, Next:[4259]drop-outs, Previous:[4260]drop on the floor, Up:[4261]= D =

drop-ins n.

[prob. by analogy with [4262]drop-outs] Spurious characters appearing on a terminal or console as a result of line noise or a system malfunction of some sort. Esp. used when these are interspersed with one’s own typed input. Compare [4263]drop-outs, sense 2. _________________________________________________________________
Node:drop-outs, Next:[4264]drugged, Previous:[4265]drop-ins, Up:[4266]= D =

drop-outs n.

1. A variety of `power glitch’ (see [4267]glitch); momentary 0 voltage on the electrical mains. 2. Missing characters in typed input due to software malfunction or system saturation (one cause of such behavior under Unix when a bad connection to a modem swamps the processor with spurious character interrupts; see [4268]screaming tty). 3. Mental glitches; used as a way of describing those occasions when the mind just seems to shut down for a couple of beats. See [4269]glitch, [4270]fried.
_________________________________________________________________
Node:drugged, Next:[4271]drum, Previous:[4272]drop-outs, Up:[4273]= D =

drugged adj.

(also `on drugs’) 1. Conspicuously stupid, heading toward [4274]brain-damaged. Often accompanied by a pantomime of toking a joint. 2. Of hardware, very slow relative to normal performance. _________________________________________________________________
Node:drum, Next:[4275]drunk mouse syndrome, Previous:[4276]drugged, Up:[4277]= D =

drum adj, n.

Ancient techspeak term referring to slow, cylindrical magnetic media that were once state-of-the-art storage devices. Under BSD Unix the disk partition used for swapping is still called /dev/drum; this has led to considerable humor and not a few straight-faced but utterly bogus `explanations’ getting foisted on [4278]newbies. See also “[4279]The Story of Mel” in Appendix A. _________________________________________________________________
Node:drunk mouse syndrome, Next:[4280]dub dub dub, Previous:[4281]drum, Up:[4282]= D =

drunk mouse syndrome n.

(also `mouse on drugs’) A malady exhibited by the mouse pointing device of some computers. The typical symptom is for the mouse cursor on the screen to move in random directions and not in sync with the motion of the actual mouse. Can usually be corrected by unplugging the mouse and plugging it back again. Another recommended fix for optical mice is to rotate your mouse pad 90 degrees.
At Xerox PARC in the 1970s, most people kept a can of copier cleaner (isopropyl alcohol) at their desks. When the steel ball on the mouse had picked up enough [4283]cruft to be unreliable, the mouse was doused in cleaner, which restored it for a while. However, this operation left a fine residue that accelerated the accumulation of cruft, so the dousings became more and more frequent. Finally, the mouse was declared `alcoholic’ and sent to the clinic to be dried out in a CFC ultrasonic bath.
_________________________________________________________________
Node:dub dub dub, Next:[4284]Duff’s device, Previous:[4285]drunk mouse syndrome, Up:[4286]= D =

dub dub dub

[common] Spoken-only shorthand for the “www” (double-u double-u double-u) in many web host names. Nothing to do with the style of reggae music called `dub’.
_________________________________________________________________
Node:Duff’s device, Next:[4287]dumb terminal, Previous:[4288]dub dub dub, Up:[4289]= D =

Duff’s device n.

The most dramatic use yet seen of [4290]fall through in C, invented by Tom Duff when he was at Lucasfilm. Trying to [4291]bum all the instructions he could out of an inner loop that copied data serially onto an output port, he decided to unroll it. He then realized that the unrolled version could be implemented by interlacing the structures of a switch and a loop:
register n = (count + 7) / 8; /* count > 0 assumed */

switch (count % 8)
{
case 0: do { *to = *from++;
case 7: *to = *from++;
case 6: *to = *from++;
case 5: *to = *from++;
case 4: *to = *from++;
case 3: *to = *from++;
case 2: *to = *from++;
case 1: *to = *from++;
} while (–n > 0);
}

Shocking though it appears to all who encounter it for the first time, the device is actually perfectly valid, legal C. C’s default [4292]fall through in case statements has long been its most controversial single feature; Duff observed that “This code forms some sort of argument in that debate, but I’m not sure whether it’s for or against.” Duff has discussed the device in detail at [4293]http://www.lysator.liu.se/c/duffs-device.php. Note that the omission of postfix ++ from *to was intentional (though confusing). Duff’s device can be used to implement memory copy, but the original aim was to copy values serially into a magic IO register.
[For maximal obscurity, the outermost pair of braces above could actually be removed — GLS]
_________________________________________________________________
Node:dumb terminal, Next:[4294]dumbass attack, Previous:[4295]Duff’s device, Up:[4296]= D =

dumb terminal n.

A terminal that is one step above a [4297]glass tty, having a minimally addressable cursor but no on-screen editing or other features normally supported by a [4298]smart terminal. Once upon a time, when glass ttys were common and addressable cursors were something special, what is now called a dumb terminal could pass for a smart terminal.
_________________________________________________________________
Node:dumbass attack, Next:[4299]dumbed down, Previous:[4300]dumb terminal, Up:[4301]= D =

dumbass attack /duhm’as *-tak’/ n.
[Purdue] Notional cause of a novice’s mistake made by the experienced, especially one made while running as [4302]root under Unix, e.g., typing rm -r * or mkfs on a mounted file system. Compare [4303]adger. _________________________________________________________________
Node:dumbed down, Next:[4304]dump, Previous:[4305]dumbass attack, Up:[4306]= D =

dumbed down adj.

Simplified, with a strong connotation of oversimplified. Often, a [4307]marketroid will insist that the interfaces and documentation of software be dumbed down after the designer has burned untold gallons of midnight oil making it smart. This creates friction. See [4308]user-friendly.
_________________________________________________________________
Node:dump, Next:[4309]dumpster diving, Previous:[4310]dumbed down, Up:[4311]= D =

dump n.

1. An undigested and voluminous mass of information about a problem or the state of a system, especially one routed to the slowest available output device (compare [4312]core dump), and most especially one consisting of hex or octal [4313]runes describing the byte-by-byte state of memory, mass storage, or some file. In [4314]elder days, debugging was generally done by `groveling over’ a dump (see [4315]grovel); increasing use of high-level languages and interactive debuggers has made such tedium uncommon, and the term `dump’ now has a faintly archaic flavor. 2. A backup. This usage is typical only at large timesharing installations.
_________________________________________________________________
Node:dumpster diving, Next:[4316]dup killer, Previous:[4317]dump, Up:[4318]= D =

dumpster diving /dump’-ster di:’-ving/ n.
1. The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information (`dumpster’ is an Americanism for what is elsewhere called a `skip’). Back in AT&T’s monopoly days, before paper shredders became common office equipment, phone phreaks (see [4319]phreaking) used to organize regular dumpster runs against phone company plants and offices. Discarded and damaged copies of AT&T internal manuals taught them much. The technique is still rumored to be a favorite of crackers operating against careless targets. 2. The practice of raiding the dumpsters behind buildings where producers and/or consumers of high-tech equipment are located, with the expectation (usually justified) of finding discarded but still-valuable equipment to be nursed back to health in some hacker’s den. Experienced dumpster-divers not infrequently accumulate basements full of moldering (but still potentially useful) [4320]cruft. _________________________________________________________________
Node:dup killer, Next:[4321]dup loop, Previous:[4322]dumpster diving, Up:[4323]= D =

dup killer /d[y]oop kill’r/ n.

[FidoNet] Software that is supposed to detect and delete duplicates of a message that may have reached the FidoNet system via different routes.
_________________________________________________________________
Node:dup loop, Next:[4324]dusty deck, Previous:[4325]dup killer, Up:[4326]= D =

dup loop /d[y]oop loop/ (also `dupe loop’) n.
[FidoNet] An infinite stream of duplicated, near-identical messages on a FidoNet [4327]echo, the only difference being unique or mangled identification information applied by a faulty or incorrectly configured system or network gateway, thus rendering [4328]dup killers ineffective. If such a duplicate message eventually reaches a system through which it has already passed (with the original identification information), all systems passed on the way back to that system are said to be involved in a [4329]dup loop. _________________________________________________________________
Node:dusty deck, Next:[4330]DWIM, Previous:[4331]dup loop, Up:[4332]= D =

dusty deck n.

Old software (especially applications) which one is obliged to remain compatible with, or to maintain ([4333]DP types call this `legacy code’, a term hackers consider smarmy and excessively reverent). The term implies that the software in question is a holdover from card-punch days. Used esp. when referring to old scientific and [4334]number-crunching software, much of which was written in FORTRAN and very poorly documented but is believed to be too expensive to replace. See [4335]fossil; compare [4336]crawling horror. _________________________________________________________________
Node:DWIM, Next:[4337]dynner, Previous:[4338]dusty deck, Up:[4339]= D =

DWIM /dwim/

[acronym, `Do What I Mean’] 1. adj. Able to guess, sometimes even correctly, the result intended when bogus input was provided. 2. n. obs. The BBNLISP/INTERLISP function that attempted to accomplish this feat by correcting many of the more common errors. See [4340]hairy. 3. Occasionally, an interjection hurled at a balky computer, esp. when one senses one might be tripping over legalisms (see [4341]legalese). 4. Of a person, someone whose directions are incomprehensible and vague, but who nevertheless has the expectation that you will solve the problem using the specific method he/she has in mind.
Warren Teitelman originally wrote DWIM to fix his typos and spelling errors, so it was somewhat idiosyncratic to his style, and would often make hash of anyone else’s typos if they were stylistically different. Some victims of DWIM thus claimed that the acronym stood for `Damn Warren’s Infernal Machine!’.

In one notorious incident, Warren added a DWIM feature to the command interpreter used at Xerox PARC. One day another hacker there typed delete *$ to free up some disk space. (The editor there named backup files by appending $ to the original file name, so he was trying to delete any backup files left over from old editing sessions.) It happened that there weren’t any editor backup files, so DWIM helpfully reported *$ not found, assuming you meant ‘delete *’. It then started to delete all the files on the disk! The hacker managed to stop it with a [4342]Vulcan nerve pinch after only a half dozen or so files were lost.

The disgruntled victim later said he had been sorely tempted to go to Warren’s office, tie Warren down in his chair in front of his workstation, and then type delete *$ twice.
DWIM is often suggested in jest as a desired feature for a complex program; it is also occasionally described as the single instruction the ideal computer would have. Back when proofs of program correctness were in vogue, there were also jokes about `DWIMC’ (Do What I Mean, Correctly). A related term, more often seen as a verb, is DTRT (Do The Right Thing); see [4343]Right Thing.
_________________________________________________________________
Node:dynner, Next:[4344]earthquake, Previous:[4345]DWIM, Up:[4346]= D =

dynner /din’r/ n.

32 bits, by analogy with [4347]nybble and [4348]byte. Usage: rare and extremely silly. See also [4349]playte, [4350]tayste, [4351]crumb. General discussion of such terms is under [4352]nybble. _________________________________________________________________
Node:= E =, Next:[4353]= F =, Previous:[4354]= D =, Up:[4355]The Jargon Lexicon

= E =

* [4356]earthquake:
* [4357]Easter egg:
* [4358]Easter egging:
* [4359]eat flaming death:
* [4360]EBCDIC:
* [4361]echo:
* [4362]ECP:
* [4363]ed:
* [4364]egosurf:
* [4365]eighty-column mind:
* [4366]El Camino Bignum:
* [4367]elder days:
* [4368]elegant:
* [4369]elephantine:
* [4370]elevator controller:
* [4371]elite:
* [4372]ELIZA effect:
* [4373]elvish:
* [4374]EMACS:
* [4375]email:
* [4376]emoticon:
* [4377]EMP:
* [4378]empire:
* [4379]engine:
* [4380]English:
* [4381]enhancement:
* [4382]ENQ:
* [4383]EOF:
* [4384]EOL:
* [4385]EOU:
* [4386]epoch:
* [4387]epsilon:
* [4388]epsilon squared:
* [4389]era the:
* [4390]Eric Conspiracy:
* [4391]Eris:
* [4392]erotics:
* [4393]error 33:
* [4394]eurodemo:
* [4395]evil:
* [4396]evil and rude:
* [4397]Evil Empire:
* [4398]exa-:
* [4399]examining the entrails:
* [4400]EXCH:
* [4401]excl:
* [4402]EXE:
* [4403]exec:
* [4404]exercise left as an:
* [4405]Exon:
* [4406]Exploder:
* [4407]exploit:
* [4408]external memory:
* [4409]eye candy:
* [4410]eyeball search:
_________________________________________________________________
Node:earthquake, Next:[4411]Easter egg, Previous:[4412]dynner, Up:[4413]= E =

earthquake n.

[IBM] The ultimate real-world shock test for computer hardware. Hackish sources at IBM deny the rumor that the Bay Area quake of 1989 was initiated by the company to test quality-assurance procedures at its California plants.
_________________________________________________________________
Node:Easter egg, Next:[4414]Easter egging, Previous:[4415]earthquake, Up:[4416]= E =

Easter egg n.

[from the custom of the Easter Egg hunt observed in the U.S. and many parts of Europe] 1. A message hidden in the object code of a program as a joke, intended to be found by persons disassembling or browsing the code. 2. A message, graphic, or sound effect emitted by a program (or, on a PC, the BIOS ROM) in response to some undocumented set of commands or keystrokes, intended as a joke or to display program credits. One well-known early Easter egg found in a couple of OSes caused them to respond to the command make love with not war?. Many personal computers have much more elaborate eggs hidden in ROM, including lists of the developers’ names, political exhortations, snatches of music, and (in one case) graphics images of the entire development team.
_________________________________________________________________
Node:Easter egging, Next:[4417]eat flaming death, Previous:[4418]Easter egg, Up:[4419]= E =
Easter egging n.

[IBM] The act of replacing unrelated components more or less at random in hopes that a malfunction will go away. Hackers consider this the normal operating mode of [4420]field circus techs and do not love them for it. See also the jokes under [4421]field circus. Compare [4422]shotgun debugging.
_________________________________________________________________
Node:eat flaming death, Next:[4423]EBCDIC, Previous:[4424]Easter egging, Up:[4425]= E =

eat flaming death imp.

A construction popularized among hackers by the infamous [4426]CPU Wars comic; supposedly derive from a famously turgid line in a WWII-era anti-Nazi propaganda comic that ran “Eat flaming death, non-Aryan mongrels!” or something of the sort (however, it is also reported that the Firesign Theatre’s 1975 album “In The Next World, You’re On Your Own” a character won the right to scream “Eat flaming death, fascist media pigs” in the middle of Oscar night on a game show; this may have been an influence). Used in humorously overblown expressions of hostility. “Eat flaming death, [4427]EBCDIC users!” _________________________________________________________________
Node:EBCDIC, Next:[4428]echo, Previous:[4429]eat flaming death, Up:[4430]= E =

EBCDIC /eb’s*-dik/, /eb’see`dik/, or /eb’k*-dik/ n.
[abbreviation, Extended Binary Coded Decimal Interchange Code] An alleged character set used on IBM [4431]dinosaurs. It exists in at least six mutually incompatible versions, all featuring such delights as non-contiguous letter sequences and the absence of several ASCII punctuation characters fairly important for modern computer languages (exactly which characters are absent varies according to which version of EBCDIC you’re looking at). IBM adapted EBCDIC from [4432]punched card code in the early 1960s and promulgated it as a customer-control tactic (see [4433]connector conspiracy), spurning the already established ASCII standard. Today, IBM claims to be an open-systems company, but IBM’s own description of the EBCDIC variants and how to convert between them is still internally classified top-secret, burn-before-reading. Hackers blanch at the very name of EBCDIC and consider it a manifestation of purest [4434]evil. See also [4435]fear and loathing.
_________________________________________________________________
Node:echo, Next:[4436]ECP, Previous:[4437]EBCDIC, Up:[4438]= E =
echo [FidoNet] n.

A [4439]topic group on [4440]FidoNet’s echomail system. Compare [4441]newsgroup.
_________________________________________________________________
Node:ECP, Next:[4442]ed, Previous:[4443]echo, Up:[4444]= E =
ECP /E-C-P/ n.

See [4445]spam and [4446]velveeta. _________________________________________________________________
Node:ed, Next:[4447]egosurf, Previous:[4448]ECP, Up:[4449]= E =
ed n.

“ed is the standard text editor.” Line taken from original the [4450]Unix manual page on ed, an ancient line-oriented editor that is by now used only by a few [4451]Real Programmers, and even then only for batch operations. The original line is sometimes uttered near the beginning of an emacs vs. vi holy war on [4452]Usenet, with the (vain) hope to quench the discussion before it really takes off. Often followed by a standard text describing the many virtues of ed (such as the small memory [4453]footprint on a Timex Sinclair, and the consistent (because nearly non-existent) user interface). _________________________________________________________________
Node:egosurf, Next:[4454]eighty-column mind, Previous:[4455]ed, Up:[4456]= E =

egosurf vi.

To search the net for your name or links to your web pages. Perhaps connected to long-established SF-fan slang `egoscan’, to search for one’s name in a fanzine.
_________________________________________________________________
Node:eighty-column mind, Next:[4457]El Camino Bignum, Previous:[4458]egosurf, Up:[4459]= E =
eighty-column mind n.

[IBM] The sort said to be possessed by persons for whom the transition from [4460]punched card to tape was traumatic (nobody has dared tell them about disks yet). It is said that these people, including (according to an old joke) the founder of IBM, will be buried `face down, 9-edge first’ (the 9-edge being the bottom of the card). This directive is inscribed on IBM’s 1402 and 1622 card readers and is referenced in a famous bit of doggerel called “The Last Bug”, the climactic lines of which are as follows: He died at the console
Of hunger and thirst.
Next day he was buried,
Face down, 9-edge first.

The eighty-column mind was thought by most hackers to dominate IBM’s customer base and its thinking. This only began to change in the mid-1990s when IBM began to reinvent itself after the triumph of the [4461]killer micro. See [4462]IBM, [4463]fear and loathing, [4464]card walloper. A copy of “The Last Bug” lives on the the GNU site at [4465]http://www.gnu.org/fun/jokes/last.bug.php. _________________________________________________________________
Node:El Camino Bignum, Next:[4466]elder days, Previous:[4467]eighty-column mind, Up:[4468]= E =
El Camino Bignum /el’ k*-mee’noh big’nuhm/ n.
The road mundanely called El Camino Real, running along San Francisco peninsula. It originally extended all the way down to Mexico City; many portions of the old road are still intact. Navigation on the San Francisco peninsula is usually done relative to El Camino Real, which defines [4469]logical north and south even though it isn’t really north-south in many places. El Camino Real runs right past Stanford University and so is familiar to hackers.
The Spanish word `real’ (which has two syllables: /ray-ahl’/) means `royal’; El Camino Real is `the royal road’. In the FORTRAN language, a `real’ quantity is a number typically precise to seven significant digits, and a `double precision’ quantity is a larger floating-point number, precise to perhaps fourteen significant digits (other languages have similar `real’ types).

When a hacker from MIT visited Stanford in 1976, he remarked what a long road El Camino Real was. Making a pun on `real’, he started calling it `El Camino Double Precision’ — but when the hacker was told that the road was hundreds of miles long, he renamed it `El Camino Bignum’, and that name has stuck. (See [4470]bignum.)
[GLS has since let slip that the unnamed hacker in this story was in fact himself –ESR]

In recent years, the synonym `El Camino Virtual’ has been reported as an alternate at IBM and Amdahl sites in the Valley. Mathematically literate hackers in the Valley have also been heard to refer to some major cross-street intersecting El Camino Real as “El Camino Imaginary”. One popular theory is that the intersection is located near Moffett Field – where they keep all those complex planes. _________________________________________________________________
Node:elder days, Next:[4471]elegant, Previous:[4472]El Camino Bignum, Up:[4473]= E =

elder days n.

The heroic age of hackerdom (roughly, pre-1980); the era of the [4474]PDP-10, [4475]TECO, [4476]ITS, and the ARPANET. This term has been rather consciously adopted from J. R. R. Tolkien’s fantasy epic “The Lord of the Rings”. Compare [4477]Iron Age; see also [4478]elvish and [4479]Great Worm.
_________________________________________________________________
Node:elegant, Next:[4480]elephantine, Previous:[4481]elder days, Up:[4482]= E =

elegant adj.

[common; from mathematical usage] Combining simplicity, power, and a certain ineffable grace of design. Higher praise than `clever’, `winning’, or even [4483]cuspy.

The French aviator, adventurer, and author Antoine de Saint-Exupéry, probably best known for his classic children’s book “The Little Prince”, was also an aircraft designer. He gave us perhaps the best definition of engineering elegance when he said “A designer knows he has achieved perfection not when there is nothing left to add, but when there is nothing left to take away.” _________________________________________________________________
Node:elephantine, Next:[4484]elevator controller, Previous:[4485]elegant, Up:[4486]= E =
elephantine adj.

Used of programs or systems that are both conspicuous [4487]hogs (owing perhaps to poor design founded on [4488]brute force and ignorance) and exceedingly [4489]hairy in source form. An elephantine program may be functional and even friendly, but (as in the old joke about being in bed with an elephant) it’s tough to have around all the same (and, like a pachyderm, difficult to maintain). In extreme cases, hackers have been known to make trumpeting sounds or perform expressive proboscatory mime at the mention of the offending program. Usage: semi-humorous. Compare `has the elephant nature’ and the somewhat more pejorative [4490]monstrosity. See also [4491]second-system effect and [4492]baroque. _________________________________________________________________
Node:elevator controller, Next:[4493]elite, Previous:[4494]elephantine, Up:[4495]= E =
elevator controller n.

An archetypal dumb embedded-systems application, like [4496]toaster (which superseded it). During one period (1983-84) in the deliberations of ANSI X3J11 (the C standardization committee) this was the canonical example of a really stupid, memory-limited computation environment. “You can’t require printf(3) to be part of the default runtime library — what if you’re targeting an elevator controller?” Elevator controllers became important rhetorical weapons on both sides of several [4497]holy wars.
_________________________________________________________________
Node:elite, Next:[4498]ELIZA effect, Previous:[4499]elevator controller, Up:[4500]= E =

elite adj.

Clueful. Plugged-in. One of the cognoscenti. Also used as a general positive adjective. This term is not actually native hacker slang; it is used primarily by crackers and [4501]warez d00dz, for which reason hackers use it only with heavy irony. The term used to refer to the folks allowed in to the “hidden” or “privileged” sections of BBSes in the early 1980s (which, typically, contained pirated software). Frequently, early boards would only let you post, or even see, a certain subset of the sections (or `boards’) on a BBS. Those who got to the frequently legendary `triple super secret’ boards were elite. Misspellings of this term in warez d00dz style abound; the forms `eleet’, and `31337′ (among others) have been sighted.
A true hacker would be more likely to use `wizardly’. Oppose [4502]lamer.
_________________________________________________________________
Node:ELIZA effect, Next:[4503]elvish, Previous:[4504]elite, Up:[4505]= E =

ELIZA effect /*-li:’z* *-fekt’/ n.
[AI community] The tendency of humans to attach associations to terms from prior experience. For example, there is nothing magic about the symbol + that makes it well-suited to indicate addition; it’s just that people associate it with addition. Using + or `plus’ to mean addition in a computer language is taking advantage of the ELIZA effect.

This term comes from the famous ELIZA program by Joseph Weizenbaum, which simulated a Rogerian psychotherapist by rephrasing many of the patient’s statements as questions and posing them to the patient. It worked by simple pattern recognition and substitution of key words into canned phrases. It was so convincing, however, that there are many anecdotes about people becoming very emotionally caught up in dealing with ELIZA. All this was due to people’s tendency to attach to words meanings which the computer never put there. The ELIZA effect is a [4506]Good Thing when writing a programming language, but it can blind you to serious shortcomings when analyzing an Artificial Intelligence system. Compare [4507]ad-hockery; see also [4508]AI-complete. Sources for a clone of the original Eliza are available at
[4509]ftp://ftp.cc.utexas.edu/pub/AI_ATTIC/Programs/Classic/Eliza/Eliz a.c.
_________________________________________________________________
Node:elvish, Next:[4510]EMACS, Previous:[4511]ELIZA effect, Up:[4512]= E =

elvish n.

1. The Tengwar of Feanor, a table of letterforms resembling the beautiful Celtic half-uncial hand of the “Book of Kells”. Invented and described by J. R. R. Tolkien in “The Lord of The Rings” as an orthography for his fictional `elvish’ languages, this system (which is both visually and phonetically [4513]elegant) has long fascinated hackers (who tend to be intrigued by artificial languages in general). It is traditional for graphics printers, plotters, window systems, and the like to support a Feanorian typeface as one of their demo items. See also [4514]elder days. 2. By extension, any odd or unreadable typeface produced by a graphics device. 3. The typeface mundanely called `Böcklin’, an art-Noveau display font. _________________________________________________________________
Node:EMACS, Next:[4515]email, Previous:[4516]elvish, Up:[4517]= E =
EMACS /ee’maks/ n.

[from Editing MACroS] The ne plus ultra of hacker editors, a programmable text editor with an entire LISP system inside it. It was originally written by Richard Stallman in [4518]TECO under [4519]ITS at the MIT AI lab; AI Memo 554 described it as “an advanced, self-documenting, customizable, extensible real-time display editor”. It has since been reimplemented any number of times, by various hackers, and versions exist that run under most major operating systems. Perhaps the most widely used version, also written by Stallman and now called “[4520]GNU EMACS” or [4521]GNUMACS, runs principally under Unix. (Its close relative XEmacs is the second most popular version.) It includes facilities to run compilation subprocesses and send and receive mail or news; many hackers spend up to 80% of their [4522]tube time inside it. Other variants include [4523]GOSMACS, CCA EMACS, UniPress EMACS, Montgomery EMACS, jove, epsilon, and MicroEMACS. (Though we use the original all-caps spelling here, it is nowadays very commonly `Emacs’.)
Some EMACS versions running under window managers iconify as an overflowing kitchen sink, perhaps to suggest the one feature the editor does not (yet) include. Indeed, some hackers find EMACS too [4524]heavyweight and [4525]baroque for their taste, and expand the name as `Escape Meta Alt Control Shift’ to spoof its heavy reliance on keystrokes decorated with [4526]bucky bits. Other spoof expansions include `Eight Megabytes And Constantly Swapping’ (from when that was a lot of [4527]core), `Eventually malloc()s All Computer Storage’, and `EMACS Makes A Computer Slow’ (see [4528]recursive acronym). See also [4529]vi.
_________________________________________________________________
Node:email, Next:[4530]emoticon, Previous:[4531]EMACS, Up:[4532]= E =
email /ee’mayl/

(also written `e-mail’ and `E-mail’) 1. n. Electronic mail automatically passed through computer networks and/or via modems over common-carrier lines. Contrast [4533]snail-mail, [4534]paper-net, [4535]voice-net. See [4536]network address. 2. vt. To send electronic mail.

Oddly enough, the word `emailed’ is actually listed in the OED; it means “embossed (with a raised pattern) or perh. arranged in a net or open work”. A use from 1480 is given. The word is probably derived from French `émaillé’ (enameled) and related to Old French `emmailleüre’ (network). A French correspondent tells us that in modern French, `email’ is a hard enamel obtained by heating special paints in a furnace; an `emailleur’ (no final e) is a craftsman who makes email (he generally paints some objects (like, say, jewelry) and cooks them in a furnace).

There are numerous spelling variants of this word. In Internet traffic up to 1995, `email’ predominates, `e-mail’ runs a not-too-distant second, and `E-mail’ and `Email’ are a distant third and fourth. _________________________________________________________________
Node:emoticon, Next:[4537]EMP, Previous:[4538]email, Up:[4539]= E =
emoticon /ee-moh’ti-kon/ n.

[common] An ASCII glyph used to indicate an emotional state in email or news. Although originally intended mostly as jokes, emoticons (or some other explicit humor indication) are virtually required under certain circumstances in high-volume text-only communication forums such as Usenet; the lack of verbal and visual cues can otherwise cause what were intended to be humorous, sarcastic, ironic, or otherwise non-100%-serious comments to be badly misinterpreted (not always even by [4540]newbies), resulting in arguments and [4541]flame wars.
Hundreds of emoticons have been proposed, but only a few are in common use. These include:

🙂
`smiley face’ (for humor, laughter, friendliness, occasionally sarcasm)

🙁
`frowney face’ (for sadness, anger, or upset)
😉
`half-smiley’ ([4542]ha ha only serious); also known as `semi-smiley’ or `winkey face’.

:-/
`wry face’

(These may become more comprehensible if you tilt your head sideways, to the left.)

The first two listed are by far the most frequently encountered. Hyphenless forms of them are common on CompuServe, GEnie, and BIX; see also [4543]bixie. On [4544]Usenet, `smiley’ is often used as a generic term synonymous with [4545]emoticon, as well as specifically for the happy-face emoticon.

It appears that the emoticon was invented by one Scott Fahlman on the CMU [4546]bboard systems sometime between early 1981 and mid-1982. He later wrote: “I wish I had saved the original post, or at least recorded the date for posterity, but I had no idea that I was starting something that would soon pollute all the world’s communication channels.” [GLS confirms that he remembers this original posting].
Note for the [4547]newbie: Overuse of the smiley is a mark of loserhood! More than one per paragraph is a fairly sure sign that you’ve gone over the line.
_________________________________________________________________
Node:EMP, Next:[4548]empire, Previous:[4549]emoticon, Up:[4550]= E =
EMP /E-M-P/

See [4551]spam.
_________________________________________________________________
Node:empire, Next:[4552]engine, Previous:[4553]EMP, Up:[4554]= E =
empire n.

Any of a family of military simulations derived from a game written by Peter Langston many years ago. A number of multi-player variants of varying degrees of sophistication exist, and one single-player version implemented for both Unix and VMS; the latter is even available as MS-DOS freeware. All are notoriously addictive. Of various commercial derivatives the best known is probably “Empire Deluxe” on PCs and Amigas.

Modern empire is a real-time wargame played over the internet by up to 120 players. Typical games last from 24 hours (blitz) to a couple of months (long term). The amount of sleep you can get while playing is a function of the rate at which updates occur and the number of co-rulers of your country. Empire server software is available for unix-like machines, and clients for Unix and other platforms. A comprehensive history of the game is available at [4555]http://www.empire.cx/infopages/History.php. The Empire resource site is at [4556]http://www.empire.cx/. _________________________________________________________________
Node:engine, Next:[4557]English, Previous:[4558]empire, Up:[4559]= E =
engine n.

1. A piece of hardware that encapsulates some function but can’t be used without some kind of [4560]front end. Today we have, especially, `print engine’: the guts of a laser printer. 2. An analogous piece of software; notionally, one that does a lot of noisy crunching, such as a `database engine’.

The hacker senses of `engine’ are actually close to its original, pre-Industrial-Revolution sense of a skill, clever device, or instrument (the word is cognate to `ingenuity’). This sense had not been completely eclipsed by the modern connotation of power-transducing machinery in Charles Babbage’s time, which explains why he named the stored-program computer that he designed in 1844 the `Analytical Engine’.
_________________________________________________________________
Node:English, Next:[4561]enhancement, Previous:[4562]engine, Up:[4563]= E =

English

1. n. obs. The source code for a program, which may be in any language, as opposed to the linkable or executable binary produced from it by a compiler. The idea behind the term is that to a real hacker, a program written in his favorite programming language is at least as readable as English. Usage: mostly by old-time hackers, though recognizable in context. Today the prefereed shorthand is sinply [4564]source. 2. The official name of the database language used by the old Pick Operating System, actually a sort of crufty, brain-damaged SQL with delusions of grandeur. The name permitted [4565]marketroids to say “Yes, and you can program our computers in English!” to ignorant [4566]suits without quite running afoul of the truth-in-advertising laws.
_________________________________________________________________
Node:enhancement, Next:[4567]ENQ, Previous:[4568]English, Up:[4569]= E =

enhancement n.

Common [4570]marketroid-speak for a bug [4571]fix. This abuse of language is a popular and time-tested way to turn incompetence into increased revenue. A hacker being ironic would instead call the fix a [4572]feature — or perhaps save some effort by declaring the bug itself to be a feature.
_________________________________________________________________
Node:ENQ, Next:[4573]EOF, Previous:[4574]enhancement, Up:[4575]= E =
ENQ /enkw/ or /enk/

[from the ASCII mnemonic ENQuire for 0000101] An on-line convention for querying someone’s availability. After opening a [4576]talk mode connection to someone apparently in heavy hack mode, one might type SYN SYN ENQ? (the SYNs representing notional synchronization bytes), and expect a return of [4577]ACK or [4578]NAK depending on whether or not the person felt interruptible. Compare [4579]ping, [4580]finger, and the usage of FOO? listed under [4581]talk mode. _________________________________________________________________
Node:EOF, Next:[4582]EOL, Previous:[4583]ENQ, Up:[4584]= E =
EOF /E-O-F/ n.

[abbreviation, `End Of File’] 1. [techspeak] The [4585]out-of-band value returned by C’s sequential character-input functions (and their equivalents in other environments) when end of file has been reached. This value is usually -1 under C libraries postdating V6 Unix, but was originally 0. DOS hackers think EOF is ^Z, and a few Amiga hackers think it’s ^\. 2. [Unix] The keyboard character (usually control-D, the ASCII EOT (End Of Transmission) character) that is mapped by the terminal driver into an end-of-file condition. 3. Used by extension in non-computer contexts when a human is doing something that can be modeled as a sequential read and can’t go further. “Yeah, I looked for a list of 360 mnemonics to post as a joke, but I hit EOF pretty fast; all the library had was a [4586]JCL manual.” See also [4587]EOL. _________________________________________________________________
Node:EOL, Next:[4588]EOU, Previous:[4589]EOF, Up:[4590]= E =
EOL /E-O-L/ n.

[End Of Line] Syn. for [4591]newline, derived perhaps from the original CDC6600 Pascal. Now rare, but widely recognized and occasionally used for brevity. Used in the example entry under [4592]BNF. See also [4593]EOF.
_________________________________________________________________
Node:EOU, Next:[4594]epoch, Previous:[4595]EOL, Up:[4596]= E =
EOU /E-O-U/ n.

The mnemonic of a mythical ASCII control character (End Of User) that would make an ASR-33 Teletype explode on receipt. This construction parodies the numerous obscure delimiter and control characters left in ASCII from the days when it was associated more with wire-service teletypes than computers (e.g., FS, GS, RS, US, EM, SUB, ETX, and esp. EOT). It is worth remembering that ASR-33s were big, noisy mechanical beasts with a lot of clattering parts; the notion that one might explode was nowhere near as ridiculous as it might seem to someone sitting in front of a [4597]tube or flatscreen today. _________________________________________________________________
Node:epoch, Next:[4598]epsilon, Previous:[4599]EOU, Up:[4600]= E =
epoch n.

[Unix: prob. from astronomical timekeeping] The time and date corresponding to 0 in an operating system’s clock and timestamp values. Under most Unix versions the epoch is 00:00:00 GMT, January 1, 1970; under VMS, it’s 00:00:00 of November 17, 1858 (base date of the U.S. Naval Observatory’s ephemerides); on a Macintosh, it’s the midnight beginning January 1 1904. System time is measured in seconds or [4601]ticks past the epoch. Weird problems may ensue when the clock wraps around (see [4602]wrap around), which is not necessarily a rare event; on systems counting 10 ticks per second, a signed 32-bit count of ticks is good only for 6.8 years. The 1-tick-per-second clock of Unix is good only until January 18, 2038, assuming at least some software continues to consider it signed and that word lengths don’t increase by then. See also [4603]wall time. Microsoft Windows, on the other hand, has an epoch problem every 49.7 days – but this is seldom noticed as Windows is almost incapable of staying up continuously for that long.
_________________________________________________________________
Node:epsilon, Next:[4604]epsilon squared, Previous:[4605]epoch, Up:[4606]= E =

epsilon

[see [4607]delta] 1. n. A small quantity of anything. “The cost is epsilon.” 2. adj. Very small, negligible; less than [4608]marginal. “We can get this feature for epsilon cost.” 3. `within epsilon of’: close enough to be indistinguishable for all practical purposes, even closer than being `within delta of’. “That’s not what I asked for, but it’s within epsilon of what I wanted.” Alternatively, it may mean not close enough, but very little is required to get it there: “My program is within epsilon of working.”
_________________________________________________________________
Node:epsilon squared, Next:[4609]era the, Previous:[4610]epsilon, Up:[4611]= E =

epsilon squared n.

A quantity even smaller than [4612]epsilon, as small in comparison to epsilon as epsilon is to something normal; completely negligible. If you buy a supercomputer for a million dollars, the cost of the thousand-dollar terminal to go with it is [4613]epsilon, and the cost of the ten-dollar cable to connect them is epsilon squared. Compare [4614]lost in the underflow, [4615]lost in the noise. _________________________________________________________________
Node:era the, Next:[4616]Eric Conspiracy, Previous:[4617]epsilon squared, Up:[4618]= E =

era n.

Syn. [4619]epoch. Webster’s Unabridged makes these words almost synonymous, but `era’ more often connotes a span of time rather than a point in time, whereas the reverse is true for [4620]epoch. The [4621]epoch usage is recommended.
_________________________________________________________________
Node:Eric Conspiracy, Next:[4622]Eris, Previous:[4623]era the, Up:[4624]= E =

Eric Conspiracy n.

A shadowy group of mustachioed hackers named Eric first pinpointed as a sinister conspiracy by an infamous talk.bizarre posting ca. 1987; this was doubtless influenced by the numerous `Eric’ jokes in the Monty Python oeuvre. There do indeed seem to be considerably more mustachioed Erics in hackerdom than the frequency of these three traits can account for unless they are correlated in some arcane way. Well-known examples include Eric Allman (he of the `Allman style’ described under [4625]indent style) and Erik Fair (co-author of NNTP); your editor has heard from more than sixty others by email, and the organization line `Eric Conspiracy Secret Laboratories’ now emanates regularly from more than one site. See the Eric Conspiracy Web Page at [4626]http://www.ccil.org/~esr/ecsl/ for full details. _________________________________________________________________
Node:Eris, Next:[4627]erotics, Previous:[4628]Eric Conspiracy, Up:[4629]= E =

Eris /e’ris/ n.

The Greek goddess of Chaos, Discord, Confusion, and Things You Know Not Of; her name was latinized to Discordia and she was worshiped by that name in Rome. Not a very friendly deity in the Classical original, she was reinvented as a more benign personification of creative anarchy starting in 1959 by the adherents of [4630]Discordianism and has since been a semi-serious subject of veneration in several `fringe’ cultures, including hackerdom. See [4631]Discordianism, [4632]Church of the SubGenius. _________________________________________________________________
Node:erotics, Next:[4633]error 33, Previous:[4634]Eris, Up:[4635]= E =
erotics /ee-ro’tiks/ n.

[Helsinki University of Technology, Finland] n. English-language university slang for electronics. Often used by hackers in Helsinki, maybe because good electronics excites them and makes them warm. _________________________________________________________________
Node:error 33, Next:[4636]eurodemo, Previous:[4637]erotics, Up:[4638]= E =

error 33 [XEROX PARC] n.

1. Predicating one research effort upon the success of another. 2. Allowing your own research effort to be placed on the critical path of some other project (be it a research effort or not). _________________________________________________________________
Node:eurodemo, Next:[4639]evil, Previous:[4640]error 33, Up:[4641]= E =

eurodemo /yoor’o-dem`-o/

a [4642]demo, sense 4
_________________________________________________________________
Node:evil, Next:[4643]evil and rude, Previous:[4644]eurodemo, Up:[4645]= E =

evil adj.

As used by hackers, implies that some system, program, person, or institution is sufficiently maldesigned as to be not worth the bother of dealing with. Unlike the adjectives in the [4646]cretinous/[4647]losing/[4648]brain-damaged series, `evil’ does not imply incompetence or bad design, but rather a set of goals or design criteria fatally incompatible with the speaker’s. This usage is more an esthetic and engineering judgment than a moral one in the mainstream sense. “We thought about adding a [4649]Blue Glue interface but decided it was too evil to deal with.” “[4650]TECO is neat, but it can be pretty evil if you’re prone to typos.” Often pronounced with the first syllable lengthened, as /eeee’vil/. Compare [4651]evil and rude.
_________________________________________________________________
Node:evil and rude, Next:[4652]Evil Empire, Previous:[4653]evil, Up:[4654]= E =

evil and rude adj.

Both [4655]evil and [4656]rude, but with the additional connotation that the rudeness was due to malice rather than incompetence. Thus, for example: Microsoft’s Windows NT is evil because it’s a competent implementation of a bad design; it’s rude because it’s gratuitously incompatible with Unix in places where compatibility would have been as easy and effective to do; but it’s evil and rude because the incompatibilities are apparently there not to fix design bugs in Unix but rather to lock hapless customers and developers into the Microsoft way. Hackish evil and rude is close to the mainstream sense of `evil’. _________________________________________________________________
Node:Evil Empire, Next:[4657]exa-, Previous:[4658]evil and rude, Up:[4659]= E =

Evil Empire n.

[from Ronald Reagan’s famous characterization of the communist Soviet Union] Formerly [4660]IBM, now [4661]Microsoft. Functionally, the company most hackers love to hate at any given time. Hackers like to see themselves as romantic rebels against the Evil Empire, and frequently adopt this role to the point of ascribing rather more power and malice to the Empire than it actually has. See also [4662]Borg and search for [4663]Evil Empire pages on the Web. _________________________________________________________________
Node:exa-, Next:[4664]examining the entrails, Previous:[4665]Evil Empire, Up:[4666]= E =

exa- /ek’s*/ pref.

[SI] See [4667]quantifiers.
_________________________________________________________________
Node:examining the entrails, Next:[4668]EXCH, Previous:[4669]exa-, Up:[4670]= E =

examining the entrails n.

The process of [4671]grovelling through a [4672]core dump or hex image in an attempt to discover the bug that brought a program or system down. The reference is to divination from the entrails of a sacrified animal. Compare [4673]runes, [4674]incantation, [4675]black art, [4676]desk check.
_________________________________________________________________
Node:EXCH, Next:[4677]excl, Previous:[4678]examining the entrails, Up:[4679]= E =

EXCH /eks’ch*/ or /eksch/ vt.

To exchange two things, each for the other; to swap places. If you point to two people sitting down and say “Exch!”, you are asking them to trade places. EXCH, meaning EXCHange, was originally the name of a PDP-10 instruction that exchanged the contents of a register and a memory location. Many newer hackers are probably thinking instead of the [4680]PostScript exchange operator (which is usually written in lowercase).
_________________________________________________________________
Node:excl, Next:[4681]EXE, Previous:[4682]EXCH, Up:[4683]= E =
excl /eks’kl/ n.

Abbreviation for `exclamation point’. See [4684]bang, [4685]shriek, [4686]ASCII.
_________________________________________________________________
Node:EXE, Next:[4687]exec, Previous:[4688]excl, Up:[4689]= E =
EXE /eks’ee/ or /eek’see/ or /E-X-E/ n.
An executable binary file. Some operating systems (notably MS-DOS, VMS, and TWENEX) use the extension .EXE to mark such files. This usage is also occasionally found among Unix programmers even though Unix executables don’t have any required suffix. _________________________________________________________________
Node:exec, Next:[4690]exercise left as an, Previous:[4691]EXE, Up:[4692]= E =

exec /eg-zek’/ or /eks’ek/ vt., n.
1. [Unix: from `execute’] Synonym for [4693]chain, derives from the exec(2) call. 2. [from `executive’] obs. The command interpreter for an [4694]OS (see [4695]shell); term esp. used around mainframes, and prob. derived from UNIVAC’s archaic EXEC 2 and EXEC 8 operating systems. 3. At IBM and VM/CMS shops, the equivalent of a shell command file (among VM/CMS users).

The mainstream `exec’ as an abbreviation for (human) executive is not used. To a hacker, an `exec’ is a always a program, never a person. _________________________________________________________________
Node:exercise left as an, Next:[4696]Exon, Previous:[4697]exec, Up:[4698]= E =

exercise, left as an adj.

[from technical books] Used to complete a proof when one doesn’t mind a [4699]handwave, or to avoid one entirely. The complete phrase is: “The proof [or `the rest’] is left as an exercise for the reader.” This comment has occasionally been attached to unsolved research problems by authors possessed of either an evil sense of humor or a vast faith in the capabilities of their audiences. _________________________________________________________________
Node:Exon, Next:[4700]Exploder, Previous:[4701]exercise left as an, Up:[4702]= E =

Exon /eks’on/ excl.

A generic obscenity that quickly entered wide use on the Internet and Usenet after [4703]Black Thursday. From the last name of Senator James Exon (Democrat-Nebraska), primary author of the [4704]CDA. _________________________________________________________________
Node:Exploder, Next:[4705]exploit, Previous:[4706]Exon, Up:[4707]= E =
Exploder n.

Used within Microsoft to refer to the Windows Explorer, the interface component of Windows 95 and WinNT 4. Our spies report that most of the heavy guns at MS came from a Unix background and use command line utilities; even they are scornful of the over-gingerbreaded [4708]WIMP environments that they have been called upon to create. _________________________________________________________________
Node:exploit, Next:[4709]external memory, Previous:[4710]Exploder, Up:[4711]= E =

exploit n.

[originally cracker slang] 1. A vulnerability in software that can be used for breaking security or otherwise attacking an Internet host over the network. The [4712]Ping O’ Death is a famous exploit. 2. More grammatically, a program that exploits an exploit in sense 1, _________________________________________________________________
Node:external memory, Next:[4713]eye candy, Previous:[4714]exploit, Up:[4715]= E =

external memory n.

A memo pad, palmtop computer, or written notes. “Hold on while I write that to external memory”. The analogy is with store or DRAM versus nonvolatile disk storage on computers. _________________________________________________________________
Node:eye candy, Next:[4716]eyeball search, Previous:[4717]external memory, Up:[4718]= E =

eye candy /i:’ kand`ee/ n.

[from mainstream slang “ear candy”] A display of some sort that’s presented to [4719]lusers to keep them distracted while the program performs necessary background tasks. “Give ’em some eye candy while the back-end [4720]slurps that [4721]BLOB into core.” Reported as mainstream usage among players of graphics-heavy computer games. We’re also told this term is mainstream slang for soft pornography, but that sense does not appear to be live among hackers. _________________________________________________________________
Node:eyeball search, Next:[4722]face time, Previous:[4723]eye candy, Up:[4724]= E =

eyeball search n.,v.

To look for something in a mass of code or data with one’s own native optical sensors, as opposed to using some sort of pattern matching software like [4725]grep or any other automated search tool. Also called a [4726]vgrep; compare [4727]vdiff, [4728]desk check. _________________________________________________________________
Node:= F =, Next:[4729]= G =, Previous:[4730]= E =, Up:[4731]The Jargon Lexicon

= F =

* [4732]face time:
* [4733]factor:
* [4734]fairings:
* [4735]fall over:
* [4736]fall through:
* [4737]fan:
* [4738]fandango on core:
* [4739]FAQ:
* [4740]FAQ list:
* [4741]FAQL:
* [4742]faradize:
* [4743]farkled:
* [4744]farming:
* [4745]fascist:
* [4746]fat electrons:
* [4747]fat-finger:
* [4748]faulty:
* [4749]fd leak:
* [4750]fear and loathing:
* [4751]feature:
* [4752]feature creature:
* [4753]feature creep:
* [4754]feature key:
* [4755]feature shock:
* [4756]featurectomy:
* [4757]feep:
* [4758]feeper:
* [4759]feeping creature:
* [4760]feeping creaturism:
* [4761]feetch feetch:
* [4762]fence:
* [4763]fencepost error:
* [4764]fiber-seeking backhoe:
* [4765]FidoNet:
* [4766]field circus:
* [4767]field servoid:
* [4768]Fight-o-net:
* [4769]File Attach:
* [4770]File Request:
* [4771]file signature:
* [4772]filk:
* [4773]film at 11:
* [4774]filter:
* [4775]Finagle’s Law:
* [4776]fine:
* [4777]finger:
* [4778]finger trouble:
* [4779]finger-pointing syndrome: * [4780]finn:
* [4781]firebottle:
* [4782]firefighting:
* [4783]firehose syndrome:
* [4784]firewall code:
* [4785]firewall machine:
* [4786]fireworks mode:
* [4787]firmware:
* [4788]firmy:
* [4789]fish:
* [4790]FISH queue:
* [4791]FITNR:
* [4792]fix:
* [4793]FIXME:
* [4794]flag:
* [4795]flag day:
* [4796]flaky:
* [4797]flamage:
* [4798]flame:
* [4799]flame bait:
* [4800]flame on:
* [4801]flame war:
* [4802]flamer:
* [4803]flap:
* [4804]flarp:
* [4805]flash crowd:
* [4806]flat:
* [4807]flat-ASCII:
* [4808]flat-file:
* [4809]flatten:
* [4810]flavor:
* [4811]flavorful:
* [4812]flippy:
* [4813]flood:
* [4814]flowchart:
* [4815]flower key:
* [4816]flush:
* [4817]flypage:
* [4818]Flyspeck 3:
* [4819]flytrap:
* [4820]FM:
* [4821]fnord:
* [4822]FOAF:
* [4823]FOD:
* [4824]fold case:
* [4825]followup:
* [4826]fontology:
* [4827]foo:
* [4828]foobar:
* [4829]fool:
* [4830]fool file:
* [4831]Foonly:
* [4832]footprint:
* [4833]for free:
* [4834]for the rest of us:
* [4835]for values of:
* [4836]fora:
* [4837]foreground:
* [4838]fork:
* [4839]fork bomb:
* [4840]forked:
* [4841]Fortrash:
* [4842]fortune cookie:
* [4843]forum:
* [4844]fossil:
* [4845]four-color glossies:
* [4846]frag:
* [4847]fragile:
* [4848]fred:
* [4849]Fred Foobar:
* [4850]frednet:
* [4851]free software:
* [4852]freeware:
* [4853]freeze:
* [4854]fried:
* [4855]frink:
* [4856]friode:
* [4857]fritterware:
* [4858]frob:
* [4859]frobnicate:
* [4860]frobnitz:
* [4861]frog:
* [4862]frogging:
* [4863]front end:
* [4864]frotz:
* [4865]frotzed:
* [4866]frowney:
* [4867]FRS:
* [4868]fry:
* [4869]fscking:
* [4870]FSF:
* [4871]FTP:
* [4872]-fu:
* [4873]FUBAR:
* [4874]fuck me harder:
* [4875]FUD:
* [4876]FUD wars:
* [4877]fudge:
* [4878]fudge factor:
* [4879]fuel up:
* [4880]Full Monty:
* [4881]fum:
* [4882]functino:
* [4883]funky:
* [4884]funny money:
* [4885]furrfu:
* [4886]fuzzball:
_________________________________________________________________
Node:face time, Next:[4887]factor, Previous:[4888]eyeball search, Up:[4889]= F =

face time n.

[common] Time spent interacting with somebody face-to-face (as opposed to via electronic links). “Oh, yeah, I spent some face time with him at the last Usenix.”
_________________________________________________________________
Node:factor, Next:[4890]fairings, Previous:[4891]face time, Up:[4892]= F =

factor n.

See [4893]coefficient of X.
_________________________________________________________________
Node:fairings, Next:[4894]fall over, Previous:[4895]factor, Up:[4896]= F =

fairings n. /fer’ingz/

[FreeBSD; orig. a typo for `fairness’] A term thrown out in discussion whenever a completely and transparently nonsensical argument in one’s favor(?) seems called for, e,g. at the end of a really long thread for which the outcome is no longer even cared about since everyone is now so sick of it; or in rebuttal to another nonsensical argument (“Change the loader to look for /kernel.pl? What about fairings?”) _________________________________________________________________
Node:fall over, Next:[4897]fall through, Previous:[4898]fairings, Up:[4899]= F =

fall over vi.

[IBM] Yet another synonym for [4900]crash or [4901]lose. `Fall over hard’ equates to [4902]crash and burn. _________________________________________________________________
Node:fall through, Next:[4903]fan, Previous:[4904]fall over, Up:[4905]= F =

fall through v.