|
|
|
|
|
|
late 1960s, this was a mainstream expression for an 'eat now, regret it later' cheap-restaurant expedition. |
|
|
|
|
|
|
|
|
snarf down v. To snarf, with the connotation of absorbing, processing, or understanding. "I'll snarf down the latest version of the nethack user's guide it's been a while since I played last and I don't know what's changed recently." |
|
|
|
|
|
|
|
|
snark n. [Lewis Carroll, via the Michigan Terminal System] 1. A system failure. When a user's process bombed, the operator would get the message "Help, Help, Snark in MTS!" 2. More generally, any kind of unexplained or threatening event on a computer (especially if it might be a boojum). Often used to refer to an event or a log file entry that might indicate an attempted security violation. See snivitz. 3. UUCP name of snark.thyrsus.com, home site of the Jargon File versions from 2.*.* on (i.e., this lexicon). |
|
|
|
|
|
|
|
|
sneaker n. An individual hired to break into places in order to test their security; analogous to tiger team. Compare samurai. |
|
|
|
|
|
|
|
|
sneakernet /snee'ker-net/ n. Term used (generally with ironic intent) for transfer of electronic information by physically carrying tape, disks, or some other media from one machine to another. "Never underestimate the bandwidth of a station wagon filled with magtape, or a 747 filled with CD-ROMs." Also called 'Tennis-Net', 'Armpit-Net', 'Floppy-Net' or 'Shoenet'. |
|
|
|
|
|
|
|
|
sniff v.,n. Synonym for poll. |
|
|
|
|
|
|
|
|
snivitz /sniv'itz/ n. A hiccup in hardware or software; a small, transient problem of unknown origin (less serious than a snark). Compare glitch. |
|
|
|
|
|
|
|
|
SO /S-O/ n. 1. (also S.O.) Abbrev. for Significant Other, almost invariably written abbreviated and pronounced /S-O/ by hackers. Used to refer to one's primary relationship, esp. a live-in to whom one is not married. See MOTAS, MOTOS, MOTSS. 2. [techspeak] The Shift Out control character in ASCII (Control-N, 0001110). |
|
|
|
|
|
|
|
|
social engineering n. Term used among crackers and samurai for cracking techniques that rely on weaknesses in wetware rather than software; the aim is to trick people into revealing passwords or other information that compromises a target system's security. Classic scams include phoning up a mark who has the required information and posing as a field service tech or a fellow employee with an urgent access problem. See also the tiger team story in the patch entry. |
|
|
|
|
|