The wannabee phenomenon has a slightly different flavor now than it did ten or fifteen years ago. These programs evolved from early demon dialer s. The connotations of this term differ sharply depending on the age and exposure of the subject.
You would then throw out a "Hello, wall? See also code grinder ; compare droid. The real running time of a program, as opposed to the number of tick s required to execute it on a timesharing system these always differ, as no one program gets all the ticks, and on multiprocessor systems with good thread support one may get more processor time than real time.
More likely you will find warez d00dz with handles like: I know, I know. Some bands of old-time hackers figured out how to induce disk-accessing patterns that would do this to particular drive models and held disk-drive races.
There is a legend about a drive that walked over to the only door to the computer room and jammed it shut; the staff had to cut a hole in the wall in order to get at it! Later, confused questioners began voicing "Wall? It was originally used in situations where, after you had carefully answered a question, the questioner stared at you blankly, clearly having understood nothing that was explained.
Warez d00dz want to belong. Only someone who is very secure with a good dose of self-esteem can stand up to the cries of fag and girlie-man. Some of these programs have become quite sophisticated, and can now detect modem, fax, or PBX tones and log each one separately.
A request for further explication. Fortunately, to do this really well, one has to actually become a wizard.
If it has copy protection on it, they break the protection so the software can be copied. The term probably originated on ITS, where the commands to begin and end transcript files were: As Ozone Pilot acutely observes: Nevertheless, old-time hackers tend to share a poorly articulated disquiet about the change; among other things, it gives them mixed feelings about the effects of public compendia of lore like this one.
The idea was that the paper for such listings was essentially good only for wallpaper, as evidenced at Stanford, where it was used to cover windows.
The whole point of the Warez sub-culture is to get the pirate program released and distributed before any other group. This is how they prove their poweress [sic].
Then they distribute it around the world via several gateways. Used of a person who is in or might be entering larval stageit is semi-approving; such wannabees can be annoying but most hackers remember that they, too, were once such creatures. Conversations can also get wanky when there are too many wanks involved.
They have been shunned by everyone, and thus turn to cyberspace for acceptance. An indication of confusion, usually spoken with a quizzical tone: Overuse of terms from this lexicon is often an indication of the wannabee nature.
Walking could also be induced by certain patterns of drive access a fast seek across the whole width of the disk, followed by a slow seek in the other direction. They like to sound badass when they can hide behind their terminals. Warez d00dz get illegal copies of copyrighted software.
Used of humans, the term is pejorative and implies an uncreative, bureaucratic, by-the-book mentality. Structure makes them happy. In Britain and the Commonwealth this word is extremely rude and is best avoided unless one intends to give offense.
They put up boards that distribute the latest ware, or pirate program. Often used in combination with mumble.
A file containing a listing e.Go to the previous, next section. = W = wabbit /wab'it/ /n./ [almost certainly from Elmer Fudd's immortal line "You wascawwy wabbit!"] 1. A legendary early hack reported on a System/ at RPI and elsewhere around ; this may have descended (if only by inspiration) from a hack called RABBITS reported from on a Burroughs at .Download