|
|
|
|
|
|
able output device (compare core dump), and most especially one consisting of hex or octal runes describing the byte-by-byte state of memory, mass storage, or some file. In elder days, debugging was generally done by groveling over a dump (see grovel); increasing use of high-level languages and interactive debuggers has made such tedium uncommon, and the term dump now has a faintly archaic flavor. 2. A backup. This usage is typical only at large timesharing installations. |
|
|
|
|
|
|
|
|
dumpster diving /dump'-ster d '-ving/ n. 1. The practice of sifting refuse from an office or technical installation to extract confidential data, especially security-compromising information ('dumpster' is an Americanism for what is elsewhere called a skip). Back in AT&T's monopoly days, before paper shredders became common office equipment, phone phreaks (see phreaking) used to organize regular dumpster runs against phone company plants and offices. Discarded and damaged copies of AT&T internal manuals taught them much. The technique is still rumored to be a favorite of crackers operating against careless targets. 2. The practice of raiding the dumpsters behind buildings where producers and/or consumers of high-tech equipment are located, with the expectation (usually justified) of finding discarded but still-valuable equipment to be nursed back to health in some hacker's den. Experienced dumpster-divers not infrequently accumulate basements full of moldering (but still potentially useful) cruft. |
|
|
|
|
|
|
|
|
dup killer /d[y]oop kill'r/ n. [FidoNet] Software that is supposed to detect and delete duplicates of a message that may have reached the FidoNet system via different routes. |
|
|
|
|
|
|
|
|
dup loop /d[y]oop loop/ (also dupe loop) n. [FidoNet] An infinite stream of duplicated, near-identical messages on a FidoNet echo, the only difference being unique or mangled identification information applied by a faulty or incorrectly configured system or network gateway, thus rendering dup killers ineffective. If such a duplicate message eventually reaches a system through which it has already passed (with the original identification information), all systems passed on the way back to that system are said to be involved in a dup loop. |
|
|
|
|
|
|
|
|
dusty deck n. Old software (especially applications) which one is obliged to remain compatible with, or to maintain (DP types call this legacy code, a term hackers consider smarmy and excessively reverent). The term implies that the software in question is a holdover from card-punch days. Used esp. when referring to old scientific and number-crunching software, much |
|
|
|
|
|