The Jargon File
Posted by Canto Rodado on August 14, 2006
This document is a collection of slang terms used by various subcultures of computer hackers. Though some technical material is included for background and flavor, it is not a technical dictionary; what we describe here is the language hackers use among themselves for fun, social communication, and technical debate.The `hacker culture’ is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who define themselves partly by rejection of `normal’ values and working habits, it has unusually rich and conscious traditions for an intentional culture less than 40 years old.
As usual with slang, the special vocabulary of hackers helps hold their culture together — it helps hackers recognize each other’s places in the community and expresses shared values and experiences. Also as usual, *not* knowing the slang (or using it inappropriately) defines one as an outsider, a mundane, or (worst of all in hackish vocabulary) possibly even a suit. All human cultures use slang in this threefold way — as a tool of communication, and of inclusion, and of exclusion.
#=== THIS IS THE JARGON FILE, VERSION 4.0.0, 24 JUL 1996 ===#
Introduction The purpose and scope of this File
A Few Terms Of Slang, Jargon and Techspeak
Revision History How the File came to be
Jargon Construction How hackers invent jargon
Hacker Writing Style How they write
Email Quotes And the Inclusion Problem
Hacker Speech Style How hackers talk
International Style Some notes on usage outside the U.S.
Lamer-speak Crackers, Phreaks, and Lamers
Pronunciation Guide How to read the pronunciation keys
Other Lexicon Conventions How to read lexicon entries
Format for New Entries How to submit new entries for the File
The Jargon Lexicon The lexicon itself
Appendix A Hacker Folklore
Appendix B A Portrait of J. Random Hacker
Appendix C Helping Hacker Culture Grow
Bibliography For your further enjoyment