Let’s be honest here. Most people who do not work in IT do not “get” IT. We have what must appear to the uninitiated as mystical powers, typing at the command line looks like programming, many of the icons in modern operating systems resemble ancient runes or glyphs, and we oft-times speak in our own secret language. Sometimes, we don’t even realize we’re doing it until a “normal” looks at us like we’re speaking in tongues, which, in fact, we are. Every culture and trade has its own secret language known only to the initiates, but in today’s post we’re going to look at 57 of the oddest/strangest/most obscure terms we use in what, to us, is everyday language. PS: this is an updated post which was originally published 2 years ago.
Pieces of data
Computer scientists had to come up with terms to define units of data. The first, smallest piece seems like it was self-evident, and the rest naturally follow.
1. Bit: a single binary piece of data, either a 0 or a 1.
2. Byte: eight bits strung together to represent a specific value such as a letter or a digit.
3. Dword: a double word, or 32 bits.
4. Nibble: a half byte, or 4 bits.
5. Word: 16 bits of data used to represent a discrete piece of data.
Terms from email
Everyone these days uses email, and there are plenty of voters and taxpayers who have never known a world without email, but there are some terms that still cause non-techies to think you’re just making things up, or who have no idea why something is called what it is.
6. Emoji: another word for emoticon, it’s those little smiley faces, frowning faces, tables, etc. that are used to convey tone or emotion in written conversations.
7. Spam: We may never have the absolute and authoritative explanation of why junk email is called spam. Some say it’s because you can liken email to ham, and not important email (junk and adverts) as spam, which is not really purely ham. I prefer to give credit to another Monty Python fan.
8. Phishing: When you see a link in your email to download an attachment from an unknown sender, it is possible you are a target for phishing. Short for password fishing, this is a fraudulent practice where private data is captured from attempting to get you to enter in your personal information. Beware of any links from suspicious emails.
PC hardware has some funny names that we just take for granted, but they had to come from somewhere.
9. Bluetooth-named for the Dread Pirate Roberts, ehm, the Dread King Bluetooth of Scandinavia, whose real name was Harald Gormsson. Apparently he had a pretty gnarly smile. No one knows for sure what Intel engineer Jim Kardach was really thinking when he came up with this codename, but it’s so much cooler than calling it Personal Area Network (PAN) that we’re glad the name stuck.
10. Mouse: what else could you expect Doug Englebart and Bill English to call their small device with a tail coming out of it, an X-Y position indicator? Fortunately their word for the cursor, bug, didn’t catch on like their invention the mouse. You can even buy mice that look like mice.
11. TWAIN: a standard for hardware interoperability, this was originally a type of technology without an interesting name, until someone was inspired by Rudyard Kipling to borrow from the Ballad of East and West, since it seemed that “…never the twain shall meet.”
Social media is probably the place full of the most tech vocabulary. If there’s a way to shorten a phrase, we’ll take it. Here are some common ones that you can use to impress your friends.
12. Filter: In the beginning, a filter was an overlay of a photo that would alter lighting and coloring to improve the picture. Today, filters consist of animated masks, hats, rainbow tongues and more. Popularized by Snapchat, flower headbands and dog ears are now able to be superimposed on our faces for a laugh.
13. Hashtag: The # character (called an octothorpe) combined with a word or phrase that concisely defined a conversation, post, tweet, or image into a category, intended to make it easier for people to find by searching on the term associated with the hashtag. On Instagram, you can use up to 30 to help improve your standings. #LetsGetToIt Brought into larger awareness by Jimmy Fallon and Justin Timberlake.
14. Like: We can thank Facebook for creating a “thumbs up” whenever we agreed with someone’s post. They have since improved your options by giving you the heart, laughing, sad, and angry emojis to let the poster know what we really think.
15. Stories: Snapchat started the trend of creating ten second peeks into everyone’s life then Instagram and Facebook followed suit. These short videos are called stories.
16. Troll: Like the humanoid that lives under bridges and preys upon the weak and innocent, trolls lurk in discussion groups or on social media websites and live only to post inflammatory statements or to ridicule and deride others. Trolling is the verb to define such actions.
17. Tweet: A post to Twitter is called a tweet, and the act of submitting a post is called tweeting.
When we talked about data above, we only mentioned those terms that apply to small representations of data. Here are the terms from programming and software that are used when talking about software.
18. Subscription: Services like Netflix for televisions and movies and Spotify for music has changed the way we consume entertainment. No one buys every song they listen to or movie they watch anymore. GFI Unlimited is a revolutionary way to access network security and communications solutions. You can subscribe to the library of full-featured, business proven software for one low price per user. Access it all.
19. Blob: A blob is a Binary Large Object, and indicates some large amount of data other than just simple text, usually stored within a database.
20. Bug: Whether first used by Thomas Edison, or referring to a moth trapped in an early computer that blocked a relay from properly functioning, today “bug” refers to any glitch or defect in software, hardware, or even the odd human.
21. Crapplet: An applet, usually Java based, that is not worth anything.
22. Dead Tree: A paper printout of an electronic file; frequently done single-sided and in color.
23. Easter Egg: Stemming from the ages-old tradition of hiding colorful eggs for children to seek out, programmers may also embed Easter Eggs in their programs for motivated hackers to find. These can require a very unlikely series of keystrokes, mouse clicks, cheat codes, etc. to activate, meaning it is usually only other programmers with access to source code who can ferret these out. They can include special credit sequences for the development team, games, or jokes. Easter eggs can now be found in operating systems, hardware ROM, and DVD and Blu-ray movies. Up-Down-Up-Down-Left-Right-Left-Right-B-A-Start is a popular way to invoke an Easter Egg, as an homage to a Konami game which used this key sequence to access a cheat code. Try it on some home media streaming devices, as some use that to get into admin mode.
24. GUI: A gooey is a Graphical User Interface, and not something that requires hand-sanitizer, but try talking about your GUI around non-techies and see what facial expressions result.
25. Hardcopy: like Dead-Tree above.
26. Hash: A hash is a fixed-length numerical value calculated from a variable length amount of data, and can be used to validate the authenticity or to detect tampering with data. It can also be used in some contexts to represent a value calculated from user credentials. Admins mentioning “pass the hash” want neither a potato and meat dish, nor do they live in Colorado.
27. Thunking: When a program must call a subroutine to complete a task, it is called thunking. In Windows, when a 64-bit operating system must downshift into 32-bit mode for legacy code, or a 32-bit version must run old 8-bit code, it is also called thunking. You can almost hear the processor grinding.
28. Virus: In nature, a virus is a primitive life-form that exists only to replicate itself, consuming resources from a host to manufacture more of itself. It is this behavior that led to code that not only does this, but also causes damage, steals data, and can provide attackers with remote access to victim machines coming to be known as a virus.
29. Warez: All 1337 speakerz replace the letter S with Z, use pidgin grammar, and shorten wordz, so “warez” is short for “softwares” and refers to ill-gotten gains, either pirated, cracked or being used with a key code to circumvent licensing requirements.
30. Worm: A software worm crawls across systems, either seeking specific data or exploiting vulnerabilities which can in turn be used to exploit other systems. Unlike a virus that must be executed by a system, a worm seeks to exploit the system through externally accessible vulnerabilities and does not require user interaction.
The Web has its own set of terms that are used regularly. Here’s three that are cropping up in everyday conversation.
31. 404: The HTTP response code for “File Not Found”, 404 is being used to simply convey things like “not found,” “not here,” or even “I don’t know.”
32. Cookies: Small files used to store state from one visit to a next, cookies are also being used to track users and deliver advertising. Anything that indicates where you have been or what you have done may now be referred to as a cookie, including phone logs and footprints.
33. Wiki: A backronym was coined to say Wiki stands for “What I Know Is” but it is actually Hawaiian for “quick.”
Pronounced “leet’ speak, it’s all the terms, acronyms, and funny sounding phrases that are used in chat, conversation, jokes and even documentation that true denizens of geekdom can use in casual conversation without skipping a beat. Whether they come from programming, IT support, social media, chat, or others, they represent 400 level GeekSpeak. Since most of these are acronyms whose meaning become obvious when written out, we’ll go through most of these quickly.
34. AFK: Away From Keyboard, to signify when you need to step away so people chatting with you don’t think you are now ignoring them.
35. AMA: Ask Me Anything, from the popular Reddit forum’s interviews with celebrities and others of note. Our favorite AMA? It has to be this one with Dr. Jane Goodall.
36. Boss Key: Any key built into a game that quickly pauses the game and brings up a spreadsheet or other screen that looks like work so your boss doesn’t realize you were goofing off.
37. CKI: Refers to an error in the Chair Keyboard Interface. Think about what connects the chair to the keyboard.
38. Crack: To compromise or suborn a piece of software, website, or remote system with malicious intent.
39. FUBAR: From an old military jargon term, this means “Fouled Up Beyond All Repair,” or at least close enough to that so my editor won’t get mad at me.
40. Hack: To improve, reverse engineer, adapt for other purposes, or suborn a piece of hardware or software, website, or remote system for the purposes of learning more or expanding capabilities.
41. ID10T: Another error, usually sounded out as Aye-Dee-Ten-Tee but seldom written as it should be pretty obvious what is being said.
42. Interwebs: Slang for the Internet, as a way to poke fun at non-technical people who confuse the Internet with the World Wide Web.
43. IRL: In Real Life
44. Kludge: A poorly programmed piece of software, a piece of hardware cobbled together from spare parts, or a project plan created by someone with no real experience with the task at hand.
45. KOS: From gaming, it stands for Kill On Site and can also be used to indicate data to be deleted or hardware to be retired.
46. LMAO: Laughing My A** Off
47. IMO: In my opinion
48. LOL: Laugh Out Loud
49. N00b: Spelled with zeroes, it indicates a relative newcomer or someone lacking experience.
50. PEBKAC: Another helpdesk acronym that indicates the Problem Exists Between the Chair and the Keyboard, like a CKI error.
51. Podcast: A podcast is any recorded media that can be consumed later and can cover virtually any topic. You can find them on all kinds of outlets. If you an Apple user, you already have an iTunes app to listen to episodes. Podcasts are usually under an hour or so, usually audio only, and consist of a lecture, dialogue, or interview on a particular topic. Many podcasters create regular programs with a unifying theme. Our current favorite podcast right now has to be Smashing Security by the great Graham Cluley and the awesome (and writer on this blog) Carole Theriault.
52. Pr0n: Also spelled with a zero and with intentional shifting of positions, it stands in the place of porn to indicate pornography, and was probably coined as an attempt to get around simple word filters.
53. Pwn: Gaming term for “own,” indicating that when one player pwns another, he or she has defeated his or her opponent.
54. TBH: To be honest
55. SNAFU: Situation Normal, All Fouled Up, or close enough you get the gist. SNAFUs can be one word status reports, sit-reps, or responses to “sup?”
56. Sneakernet-The old-fashioned way of transferring data using external, portable media by copying the data to disk and then walking it over somewhere.
57. Teh: Whether it’s poor typing skills or just a way to be cool, “Teh” stands in for “The” but can also indicate emphasis.
There are so many other great candidates for this list. Which are your favorite? Leave a comment below.