StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wide Spread of Hackers Slang - Essay Example

Cite this document
Summary
"Wide Spread of Hackers’ Slang" paper analizes computer hackers’ slang that consists of non-standard use of English words or the creation of new words among various computer specialists, not only hackers. This is a special computer dialect aimed at excluding certain people from the conversation. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
Wide Spread of Hackers Slang
Read Text Preview

Extract of sample "Wide Spread of Hackers Slang"

Computer hackers' slang consists of non-standard use of English words or creation of new words among various computer specialists, not only hackers. This is special computer dialect aimed at excluding certain people from the conversation. It functions as encryption, so that the non-initiate cannot understand the conversation, or as a further way to communicate with those who understand it. Computer hackers' slang functions as a way to recognize hackers and to differentiate them from the society at large. (Hafner & Markoff, 1991, pp.203-256) Hackers' slang constantly renews its process of expression, and specifically its vocabulary, so that those not part of the group will remain unable to understand the slang. The existence of slang dictionaries, of course, cancels the effectiveness of certain words. Kelly-Bootle (1995) defines following methods of developing words of hackers' slang: Abbreviation. Hackers denote a word by only several of its component letters. For example: "RTFM" - "read the following manual", "IMHO" - "in my humble opinion", "BTW" - "by the way" or "LOL" - "lay of laugh". Verb doubling. Hackers double verbs as a concise, sometimes sarcastic comment on what the implied subject does. Also, a doubled verb is often used to terminate a conversation, in the process remarking on the current state of affairs or what the speaker intends to do next. Typical examples involve win, lose, hack, flame, barf, and chomp, i.e. "The disk heads just crashed." "Lose, lose." Sound-alike slang. Hackers will often make rhymes or puns in order to convert an ordinary word or phrase into something more interesting, i.e. "Plug&Play" is transformed to "Plug&Pray", "Government Property - Do Not Duplicate" to "Government Duplicity - Do Not Propagate" or "Macintosh" to "Macintrash". Overgeneralization. Many hackers love to take various words and add the wrong endings to them to make nouns and verbs, often by extending a standard rule to non-uniform cases (or vice versa). For example: "win" extends to "winnitude", "winnage", "disgust" to "disgustitude", "hack" to "hackification". "Marketdroid" is a member of a company's marketing department, especially one who promises users that the next version of a product will have features that are not actually scheduled for inclusion, are extremely difficult to implement. "Careware" is a variety of shareware for which either the author suggests that some payment be made to a nominated charity or a levy directed to charity is included on top of the distribution charge. Spoken inarticulations. Words such as "mumble", "sigh", and "groan" are spoken in places where their referent might more naturally be used. It derives from the impossibility of representing such noises in a chat or by e-mail. Anthropomorphization. Hackers often anthropomorphize hardware and software, for example, it's possible to say, "the protocol handler got confused" or "the program is died". () Comparatives. Many words in hacker slang have to be understood as members of sets of comparatives. This is especially true of the adjectives and nouns used to describe the beauty and functional quality of code. Here is an approximately correct spectrum: "monstrosity brain-damage screw bug lose misfeature" or "crock kluge hack win feature elegance perfection". (Levi, 1984, pp.56-78) Numerization. Hackers often include soundalike numbers in place of words or parts of words, for example "4 you", "2 do". (Kelly-Bootle, 1995, pp.36-101) Terms of computer hackers' dialect are often particular to their subculture. Raymond (1996) writes, "The hacker culture' is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who define themselves partly by rejection of normal' values and working habits, it has unusually rich and conscious traditions for an intentional culture less than 40 years old. " (Raymond, 1996) As usual with slang, the special vocabulary of hackers helps hold their culture together - it helps hackers recognize each other's places in the community and expresses shared values and experiences. Also as usual, not knowing the slang (or using it inappropriately) defines one as an outsider, a mundane, or (worst of all in hackers' vocabulary) possibly even a suit. All human cultures use slang in this threefold way - as a tool of communication, and of inclusion, and of exclusion. Hackers lack expressiveness of the formal language to reflect the specific sense they want to show. So they invent new words or apply technical terms to the common life or vice versa. A simple example is the distinction between a "kluge" and an "elegant" solution, and the differing connotations attached to each. The distinction is not only of engineering significance; it reaches right back into the nature of the generative processes in program design and asserts something important about two different kinds of relationship between the hacker and the hack. Hacker slang is unusually rich in implications of this kind, of overtones and undertones that illuminate the hackers' spirit. But there is more. Hackers, as a rule, love wordplay and are very conscious and inventive in their use of language. These traits seem to be common in young children, but the conformity-enforcing machine we are pleased to call an educational system bludgeons them out of most of us before adolescence. Thus, linguistic invention in most subcultures of the modern West is a halting and largely unconscious process. Hackers, by contrast, regard slang formation and use as a game to be played for conscious pleasure. (Kelly-Bootle, 1995, pp.7-14) Their inventions thus display an almost unique combination of enjoyment of language-play with the discrimination of educated and powerful intelligence. Further, the electronic media, which knit them together, are fluid, hot' connections, well adapted to both the dissemination of new slang and the ruthless culling of weak and superannuated specimens. The results of this process give us perhaps a uniquely intense and accelerated view of linguistic evolution in action. Hacker slang also challenges some common linguistic and anthropological assumptions. For example, it has recently become fashionable to speak of low-context' versus high-context' communication, and to classify cultures by the preferred context level of their languages and art forms. It is usually claimed that low-context communication (characterized by precision, clarity, and completeness of self-contained utterances) is typical in cultures, which value logic, objectivity, individualism, and competition; by contrast, high-context communication (elliptical, emotive, nuance-filled, multi-modal, heavily coded (Geoffrey, 1987, pp. 48-53)) is associated with cultures, which value subjectivity, consensus, cooperation, and tradition. Hackers' slang is themed around extremely low-context interaction with computers and exhibits primarily "low-context" values, but cultivates an almost absurdly high-context slang style. Numerous slang terms pass into informal mainstream speech, and thence sometimes into mainstream formal speech. For example, the word "mainframe" carries the sense of a machine designed for batch rather than interactive use, though possibly with an interactive timesharing operating system retrofitted onto it; it is especially used of machines built by IBM and the other great companies. Originally it was referring to the cabinet containing the central processor unit or "main frame" of a building-filling old batch machine. Now it means a high-performance computer designed for resource-capacious operation, such as bank transactions of NASA projects. (Raymond, 1996) A word "patch" (temporary addition to a piece of code, usually as a quick-and-dirty remedy to an existing bug or misfeature) entered in computer users' lexicon thanks to corresponding update technology for Microsoft Windows. So hackers' slang is constructive certain form of language which not only parasitize on English but also produce new words or gives new life to old ones. With wide spread of computers words from language of computer professionals get into common language with confidence. References: 1. Hafner, K. & Markoff, J. (1991) Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon & Schuster 2. Raymond E. (1996). The New Hacker's Dictionary. Retrieved June 13, 2005 from 3. Geoffrey, J. (1987). The Tao of Programming. Santa Monica: Infobooks 4. Kelly-Bootle, S. (1995). The Computer Contradictionary. Cambridge, Massachusetts: MIT Press 5. Levy, S. (1984) Hackers. New York: Anchor/Doubleday Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Hackers slang Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/english/1533152-hackers-slang
(Hackers Slang Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/english/1533152-hackers-slang.
“Hackers Slang Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/english/1533152-hackers-slang.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wide Spread of Hackers Slang

Service and the Security Implication Voice over Ip

From the paper "Service and the Security Implication Voice over Ip" it is clear that opportunistic hackers can be akin to a criminal who just walks down a street looking for open doors or open windows if not backdoors that he can use to get inside an establishment.... ... ... ... In ensuring the security of the information technology infrastructure the VoIP infrastructure is also affected....
60 Pages (15000 words) Dissertation

Security officer

Also, nearly 100 universities servers across the globe were infringed by group of hackers identified as Team GhostShell.... Also, nearly 100 universities servers across the globe were infringed by group of hackers identified as Team GhostShell.... The hackers breached multiple servers within each of the universities thus accessing departmental Websites.... The hackers sent targeted emails or spear-phishing, with links to a Webpage that was designed to deceive the university employees responsible for student data, into inputting passwords....
9 Pages (2250 words) Essay

Advanced Persistent Threats Against RSA Tokens

Likewise, a new class of challengers called now as ‘Advanced Persistent Threats' (APT) demonstrates a well-planned and sponsored, highly skilled hackers targeting highly classified data for gaining competitive edge specifically in corporate businesses, law firms, military networks, national or international politics (Cole, 2012).... As a result, the likelihood of success for these hackers will become low....
5 Pages (1250 words) Case Study

Password and hacking under the privcy issues

It will analyze the concept of hacking and how it has evolved along time and it will provide a justification for the hackers from the inside point of view.... The law disobedient people have managed to keep pace with the technical development and at present nobody feels hackers view the people's privacy as an unknown intriguing matter, which has to be conquered.... The paper shall present the legislative acts that tend to legally protect personal information from hackers and their practical application in the real life....
21 Pages (5250 words) Research Paper

International Analysing Different Dimensions of Cyber-Warfare

The paper "Analysing Different Dimensions of Cyber-Warfare" discusses that targeted attacks can be referred to as those when a specific victim is to be targeted.... This form of attack comprises some specific software that is designed to target such victims.... ... ... ... The researcher's interpretation to some extent is not aligned with research objectives....
15 Pages (3750 words) Research Paper

Stalking the Wily Hacker

This case study "Stalking the Wily Hacker" discusses one major security attack that occurred over the internet - the case of Lawrence Berkeley National Laboratory in California.... The Internet is a resource that has brought about massive changes in the way people live.... ... ... ... The Internet has improved the way business is conducted across the world, it has also been associated with several security risks....
9 Pages (2250 words) Case Study

Fundamentals of Network Security

The World wide Web one of the largest networks at present is growing in terms of its importance for business operations as well as providing technical support to the economy.... The paper "Fundamentals of Network Security" discusses that a combination approach towards computer forensics is proposed to comprehensively as well as effectively gather facts for processing of information regarding the allegation of the employee for a possible crime....
15 Pages (3750 words) Coursework

Analysis of Hacktivism on Social Change

These protestors (hacktivists) are essentially hackers who use similar tools and techniques to disrupt online services so as to bring attention to their political cause (Li, 2013).... Lastly, hacktivists may use Internet worms, which are programs that spread within a network to spread a message or disrupt an activity (Hampson 2012) ...
9 Pages (2250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us