Whoever is interested in programming or in refinements of English should consult the essay about hackers plus extensive glossary of hacker-jargon by Guy Steele and Eric Raymond.
It can be found here (and there is a lot of it, in many files):
But if you don't know anything about programming most of it will not be for you, unless you are a linguist, or want to know more about hackers.
On the other hand... speaking for myself, I found it all quite interesting, and one of the hacker-terms that deserves to be better known is bogosity. What is "bogosity"? I quote from the urled glossary:
bogus. Bogosity is measured with a bogometer; in a seminar, when a speaker says something bogus, a listener might raise his hand and say My bogometer just triggered. More extremely, You just pinned my bogometer means you just said or did something so outrageously bogus that it is off the scale, pinning the bogometer needle at the highest possible reading (one might also say You just redlined my bogometer). The agreed-upon unit of bogosity is the microLenat. 2. The potential field generated by a bogon flux; see quantum bogodynamics. See also bogon flux, bogon filter, bogus.
bogosity: /[email protected]?tee/, n.
1. [orig. CMU, now very common] The degree to which something is
I have provided the original links, so you can read the links yourself.
Bogosity is a nice and often useful term. ("What is spirituality? Undiluted bogosity, unless it's Alzheimer.")
The jargon-collection by Raymond and Steel not only gives many nice and useful terms (with clear definitions), and a good statement about hackers and hacking, but also contains quite a few nice and useful principles.
Thus, there is the nice Hanlon's Razor, very good for your piece of mind if you happen to be highly gifted:
- Hanlon's Razor: prov.
A corollary of Finagle's Law, similar to Occam's Razor, that reads Never attribute to malice that which can be adequately explained by stupidity. Quoted here because it seems to be a particular favorite of hackers, often showing up in sig blocks, fortune cookie files and the login banners of BBS systems and commercial networks. This probably reflects the hacker's daily experience of environments created by well-intentioned but short-sighted people. Compare Sturgeon's Law, Ninety-Ninety Rule.