Lusers
   HOME
*





Lusers
Before the popularization of the Internet in the 1990s, Internet slang defined a luser (sometimes expanded to local user; also luzer or luzzer) as a painfully annoying, stupid, or irritating computer user.p. 214 The word is a Blend word, blend of "loser" and "user".p. 244 Among Hacker (programmer subculture), hackers, the word ''luser'' takes on a broad meaning, referring to any normal user (computing), user (in other words, not a "Expert, guru"), with the implication the person is also a Loser (person), loser. The term is partially interchangeable with the hacker term ''lamer''. The term can also signify a layman with only user (computing), user account Privilege (computing), privileges, as opposed to a power user or Superuser, administrator, who has knowledge of, and access to, superuser accounts; for example, an End-user (computer science), end luser who cannot be trusted with a root account for system administration. It is popular with technical support staff who have to de ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Incompatible Timesharing System
Incompatible Timesharing System (ITS) is a time-sharing operating system developed principally by the MIT Artificial Intelligence Laboratory, with help from Project MAC. The name is the jocular complement of the MIT Compatible Time-Sharing System (CTSS). ITS, and the software developed on it, were technically and culturally influential far beyond their core user community. Remote "guest" or "tourist" access was easily available via the early ARPAnet, allowing many interested parties to informally try out features of the operating system and application programs. The wide-open ITS philosophy and collaborative online community were a major influence on the hacker culture, as described in Steven Levy's book ''Hackers'', and were the direct forerunners of the free and open-source software, open-design, and Wiki movements. History ITS development was initiated in the late 1960s by those (the majority of the MIT AI Lab staff at that time) who disagreed with the direction taken by Proj ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Massachusetts Institute Of Technology
The Massachusetts Institute of Technology (MIT) is a private land-grant research university in Cambridge, Massachusetts. Established in 1861, MIT has played a key role in the development of modern technology and science, and is one of the most prestigious and highly ranked academic institutions in the world. Founded in response to the increasing industrialization of the United States, MIT adopted a European polytechnic university model and stressed laboratory instruction in applied science and engineering. MIT is one of three private land grant universities in the United States, the others being Cornell University and Tuskegee University. The institute has an urban campus that extends more than a mile (1.6 km) alongside the Charles River, and encompasses a number of major off-campus facilities such as the MIT Lincoln Laboratory, the Bates Center, and the Haystack Observatory, as well as affiliated laboratories such as the Broad and Whitehead Institutes. , 98 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Layer 8
Layer 8 is a term used to refer to ''user'' or ''political'' layer on top of the 7-layer OSI model of computer networking. The OSI model is a 7-layer abstract model that describes an architecture of data communications for networked computers. The layers build upon each other, allowing for the abstraction of specific functions in each one. The top (7th) layer is the Application Layer describing methods and protocols of software applications. It is then held that the user is the 8th layer. Layers, defined According to Bruce Schneier and RSA: * Layer 8: The individual person. * Layer 9: The organization. * Layer 10: Government or legal compliance Network World readers humorously report: * Layer 8: Money - Provides network corruption by inspiring increased interference from the upper layer. * Layer 9: Politics - Consists of technically ignorant management that negatively impacts network performance and development. and: * Layer 9: Politics. "Where the most difficult problems ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Lamer
Lamer is a jargon or slang name originally applied in cracker and phreaker culture to someone who did not really understand what they were doing. Today it is also loosely applied by IRC, BBS, demosceners, and online gaming users to anyone perceived to be contemptible. In general, the term has come to describe someone who is willfully ignorant of how things work. It is derived from the word "lame". A lamer is sometimes understood to be the antithesis of a hacker. While a hacker strives to understand the mechanisms behind what they use, even when such extended knowledge would have no practical value, a lamer only cares to learn the bare minimum necessary to operate the device in the way originally intended. Origin At least one example of the term "lamer" to mean "a dull, stupid, inept, or contemptible person" appeared as early as 1961. It was popularized among Amiga crackers of the mid-1980s by "Lamer Exterminator", a notable Amiga virus, which gradually corrupted non-write-protecte ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Id10t
A user error is an error made by the human user of a complex system, usually a computer system, in interacting with it. Although the term is sometimes used by human–computer interaction practitioners, the more formal human error term is used in the context of human reliability. Related terms such as PEBMAC ("problem exists between monitor and chair"), identity error or ID-10T/1D-10T error ("idiot error"), PICNIC ("problem in chair, not in computer"), IBM error ("idiot behind machine error") and other similar phrases are also used as slang in technical circles with derogatory meaning. This usage implies a lack of computer savviness, asserting that problems arising when using a device are the fault of the user. Critics of the term argue that the problems are caused instead by a device that does not take into account human limitations and is thus designed in a way that induces errors. The term can also be used for non-computer-related mistakes. Causes Joel Spolsky points out ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


BOFH
The Bastard Operator From Hell (BOFH) is a fictional rogue computer operator created by Simon Travaglia, who takes out his anger on users (who are "lusers" to him) and others who pester him with their computer problems, uses his expertise against his enemies and manipulates his employer. Several other people have written stories about BOFHs, but those by Simon Travaglia are considered canonical. The BOFH stories were originally posted in 1992 to Usenet by Travaglia, with some being reprinted in '' Datamation.'' They were published weekly from 1995 to 1999 in '' Network Week.'' Since 2000 they have been published regularly in ''The Register'' (UK). Several collections of the stories have been published as books. By extension, the term is also used to refer to any system administrator who displays the qualities of the original. The early accounts of the BOFH took place in a university; later the scenes were set in an office workplace. In 2000 (BOFH 2k), the BOFH and his pimply- ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Banhammer
On the Internet, a block or ban is a technical measure intended to restrict access to information or resources. Blocking and its inverse, unblocking, may be implemented by the owners of computers using software. Some countries, notably China and Singapore, block access to certain news information. In the United States, the Children's Internet Protection Act requires schools receiving federal funded discount rates for Internet access to install filter software that blocks obscene content, pornography, and, where applicable, content "harmful to minors". Blocking may also refer to denying access to a web server based on the IP address of the client machine. In certain websites, including social networks such as Facebook or editable databases like wikis, users can apply blocks (based in either IP number or account) on other users deemed undesirable to prevent them from performing certain actions. Blocks of this kind may occur for several reasons and produce different effects: in ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Internet Relay Chat
Internet Relay Chat (IRC) is a text-based chat system for instant messaging. IRC is designed for group communication in discussion forums, called ''channels'', but also allows one-on-one communication via private messages as well as chat and data transfer, including file sharing. Internet Relay Chat is implemented as an application layer protocol to facilitate communication in the form of text. The chat process works on a client–server networking model. Users connect, using a clientwhich may be a web app, a standalone desktop program, or embedded into part of a larger programto an IRC server, which may be part of a larger IRC network. Examples of programs used to connect include Mibbit, IRCCloud, KiwiIRC, and mIRC. IRC usage has been declining steadily since 2003, losing 60 percent of its users. In April 2011, the top 100 IRC networks served more than half a million users at a time. History IRC was created by Jarkko Oikarinen in August 1988 to replace a program cal ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Usenet
Usenet () is a worldwide distributed discussion system available on computers. It was developed from the general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in 1979, and it was established in 1980.''From Usenet to CoWebs: interacting with social information spaces'', Christopher Lueg, Danyel Fisher, Springer (2003), , Users read and post messages (called ''articles'' or ''posts'', and collectively termed ''news'') to one or more topic categories, known as newsgroups. Usenet resembles a bulletin board system (BBS) in many respects and is the precursor to the Internet forums that have become widely used. Discussions are threaded, as with web forums and BBSs, though posts are stored on the server sequentially.The jargon file v4.4.7
, Jargon File Archive.

[...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

User (computing)
A user is a person who utilizes a computer or network service. A user often has a user account and is identified to the system by a username (or user name). Other terms for username include login name, screenname (or screen name), account name, nickname (or nick) and handle, which is derived from the identical citizens band radio term. Some software products provide services to other systems and have no direct end users. End user End users are the ultimate human users (also referred to as operators) of a software product. The end user stands in contrast to users who support or maintain the product such as sysops, database administrators and computer technicians. The term is used to abstract and distinguish those who only use the software from the developers of the system, who enhance the software for end users. In user-centered design, it also distinguishes the software operator from the client who pays for its development and other stakeholders who may not directly ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Unix
Unix (; trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others. Initially intended for use inside the Bell System, AT&T licensed Unix to outside parties in the late 1970s, leading to a variety of both academic and commercial Unix variants from vendors including University of California, Berkeley (Berkeley Software Distribution, BSD), Microsoft (Xenix), Sun Microsystems (SunOS/Solaris (operating system), Solaris), Hewlett-Packard, HP/Hewlett Packard Enterprise, HPE (HP-UX), and IBM (IBM AIX, AIX). In the early 1990s, AT&T sold its rights in Unix to Novell, which then sold the UNIX trademark to The Open Group, an industry consortium founded in 1996. The Open Group allows the use of the mark for certified operating systems that comply with the Single UNIX Specification (SUS). Unix systems are chara ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]