Hacking dictionary | ||||||||||||||||||||||
I wasn't sure whether to include normal computer words so i made the dictionary of words which are relevent to hackers!,but as the text gets larger i will inlude more hacking words. NOTE FOR HACKERS:this is an newbie version of the dictioanry with all the common hacker words,for a 5MB dictioanry with harder words which are harder to understand goto This is a dictioanry on hacking words so if u read a hacking tutorial and dont understand anything u will find the answer here,also i didnt include words such as fdisk,486,intel,THIS IS NOT A COMPUTER DICTIONARY BUT A HACKING DICTIONARY so if your using it to looking for a graphics word !it wont be there. Tip:for more adation words related to programming and networks try www.whatis.com Hacker terms info:over the internet there thousands of hacking tutorials freely avalible,usally such texts have words in hacker slang which newbies fail to understand.This dictioanry is trying to change that although i must admit as being the main author i have a pretty big task a head of me to make it the BEST and not nessisary the biggest hacking dictioanry ever!,i have came accross lots of hacking dictioanrys but the biggest i saw was 5 Mb so over the next 3 months i am trying to make this dictioanry better than that one so with your help email me and inlude your contributing.My aim is to inlude all programming,networking,hacker slang and underground words.the biggest one i saw was made by hundreads of ppl and useneters so if u want a challenge get wriitng!>>>> to make it better i have included irc slang,hacking guides,port numbers e.t.c,also i promise u that this text is the best understandle hacker dictioanry on the web so if u dont understand anything email me. note:when i say the best dictioanry it doesnt have to be the most advanced but the most easy to understand.Hackers will note this guide is more than a dictioanry it has port numbers and all sorts of usefull info,also the guide is split into different section,e.g dictionary section,irc section and www section.
>.ACCESS:the ability to get into something or locate something on a network or local machine. >.ACCESS CODE:also known as login name or user id and password on a network which reguires u to login. >ACCESS PERMISIONS:this allows u to execute,read or change a file depending on the permsion >.ACCOUNT:your presence id on a computer system which allows u to login. >.ADAPTER:another name for an expansion card,usally most of them plug into your expansion slots on your pc. >ACTIVE X:a set of interacitve techonloiges devloped by microsoft,activex isnt a programming language but it can be dangerous for website viruses. >ACTIVE OPEN:a state in which TCP is attempting to initiate a connection. >ADDRESS:a memory location.The value is often displayed as hexadecimal,mostly to keep anyone but official pc postal employes from finding things on your computer>every thing on your hard drive has a memory location. >ADDRESS CLASS:a basic network of various sises.the network class can be determend from the first octet of its ip address >ADDRESS RESOULUTION PROTOCOL:the process of determining a MAC address, given a more abstract LAN or WAN address. Any protocol used to obtain a mapping from a higher layer address to a lower layer address. Abbreviated ARP. The acronym ARP is most often used to refer to the Ethernet Address Resolution Protocol (below). The protocol used by an IP networking layer to map IP addresses to lower level hardware (i.e., MAC) addresses. There are four ARP messages for IP running over Ethernet: arp requests and replies and reverse arp request and replies. <ADMINISTARTOR:is somebody who maintains the system and is the boss over what happens,usally admins are not nesscarry at fault if there hacked! >ADSL:adsl(asymetic digital subscriber line):is a connection to the net were users dont use dial up but have a connection 24/7 and usally have a static ip address. >ADA: Pascal-descended language that was at one time made mandatory for Department of Defense software projects by the Pentagon. Hackers are nearly unanimous in observing that, technically, it is precisely what one might expect given that kind of endorsement by fiat; designed by committee, crockish, difficult to use, and overall a disastrous, multi-billion-dollar boondoggle (one common description wss "The PL/I of the 1980s"). Hackers find Ada's exception-handling and inter-process communication features particularly hilarious. Ada Lovelace (the daughter of Lord Byron who became the world's first programmer while cooperating with Charles Babbage on the design of his mechanical computing engines in the mid-1800s) would almost certainly blanch at the use to which her name has latterly been put; the kindest thing that has been said about it is that there is probably a good small language screaming to get out from inside its vast, elephantine bulk. >AGENT:A program that performs one or more services (such as gathering information from the Internet), acting for or as a principal. >ADVANCED PEER-TO-PEER NETWORKING(APPN):An IBM peer-to-peer networking architecture that uses interconnected Type 2.1 nodes. APPN supports dynamic routing,directory searches, and network management. >ADVANCED PROGRAM-TO-PROGRAM COMMUNICATIONS(APPC) SNA's standard program-to-program communications protocol. Sometimes the term APPC is used interchangeably with Logical Unit Type 6.2 (LU 6.2). ALERT:A problem determination message sent to a network operator within IBM's network management system. >ALOHA :A 4800bps Contention Based Radio Channel Transmission System Network used in the University of Hawaii (1968 - 1972) and designed by Morman Abramson to connect the university's mainfraim IBM 360 on the Island of Oahu and terminals plaaced throught different ships and nearby islands. Data coming from the mainfraim was sent to all other terminals while data from terminals was the Contention-Based part and would re-send data if no acknowledement data was received. VLAN : Virtual Local Area Network This is a network split into workgroups by routers and each assigned a server. As any message sent will have which workgroup it is aimed at, wokgroups not receiving messages can run faster as traffic is reduced. Standards --------- Ethernet : A Network standard that is a Contention-Based Network. Ethernet evolved from a radio channel transmission system called ALOHA. >ALT:is commenly known as a computer control key but in internet terms alt is for connecting to newsgroups just like www is for connecting to the web. >ALT.2600.hackers:is a newsgroup with about 200 posters and about 5000 lurkers,it is the group shady_harrasment_panda(writter of this dictioanryis a member of.alt.2600.hackers has alot of very intellegent hackers in the group. >ALTERNITIVE CLIENT RESTOREL:The process of restoring files to a different client than the one from which they were backed up. >.AMERICAL ONLINE(AOL):a large US owned internet service provider company which mainly attracts newbies,aol has the stricted rules out of all the isp ifu post to an hackers newsgroup they terminate your account!,aol commenly attracks lamers! >.ANTIVIRUS:a program which scans a users hard drive looking for known viruses,worms,trojans,and joke files. >AMIGA:A series of personal computer models originally sold by Commodore, based on 680x0 processors, custom support chips and an operating system that combined some of the best features of Macintosh and Unix with compatibility with neither. The Amiga was released just as the personal computing world standardized on IBM-PC clones. This prevented it from gaining serious market share, despite the fact that the first Amigas had a substantial technological lead on the IBM XTs of the time. Instead, it acquired a small but zealous population of enthusiastic hackers who dreamt of one day unseating the clones (see Amiga Persecution Complex). The traits of this culture are both spoofed and illuminated in The BLAZE Humor Viewer. The strength of the Amiga platform seeded a small industry of companies building software and hardware for the platform, especially in graphics and video applications (see video toaster). Due to spectacular mismanagement, Commodore did hardly any R&D, allowing the competition to close Amiga's technological lead. After Commodore went bankrupt in 1994 the technology passed through several hands, none of whom did much with it. However, the Amiga is still being produced in Europe under license and has a substantial number of fans, which will probably extend the platform's life considerably. viruses,common virus scanners include norton and mcafee. >AMP OFF:[Purdue] vt. To run in background. From the UNIX shell `&' >ANSI; n. [techspeak] The American National Standards Institute. ANSI, along with the International Organization for Standards (ISO), standardized the C programming language (see K&R, Classic C), and promulgates many other important software standards. 2. n. [techspeak] A terminal may be said to be `ANSI' if it meets the ANSI X.364 standard for terminal control. Unfortunately, this standard was both over-complicated and too permissive. It has been retired and replaced by the ECMA-48 standard, which shares both flaws. 3. n. [BBS jargon] The set of screen-painting codes that most MS-DOS and Amiga computers accept. This comes from the ANSI.SYS device driver that must be loaded on an MS-DOS computer to view such codes. Unfortunately, neither DOS ANSI nor the BBS ANSIs derived from it exactly match the ANSI X.364 terminal standard. For example, the ESC-[1m code turns on the bold highlight on large machines, but in IBM PC/MS-DOS ANSI, it turns on `intense' (bright) colors. Also, in BBS-land, the term `ANSI' is often used to imply that a particular computer uses or can emulate the IBM high-half character set from MS-DOS. Particular use depends on context. Occasionally, the vanilla ASCII character set is used with the color codes, but on BBSs, ANSI and `IBM characters' tend to go together. >ANGLE BRASKET: Either of the characters `<' (ASCII >ANTIONLINE:is one of the many comprehensive securirty firms on the net which specialises in exploits,news,and hacker related things.www.antionline.com >.API(aplicatio program interface):defines a standard way that programs work with pull down menu's,dilogue boxes e.t.c,windows and OS/2 are examples of api in action. >.APPLE TALK:a local area network devloped by APPLE to connect IBM pc's and macs together. >APPLET:a HTML based program built with java that a browser tempory downloads to a users disk. >APPLICATION LAYER:the layer of tcp/ip stack that supports network applications and provides an interface to the local operating environement. 11.ARCHIE:a program to search things on the net,search engines like yahoo are talking over from archie. >APACHE:is a webserver used by almost 60 per cent of the web sites market that runs on windows,macs,and unix. .>APP: Short for `application program', as opposed to a systems program. Apps are what systems vendors are forever chasing developers to create for their environments so they can sell more boxes. Hackers tend not to think of the things they themselves run as apps; thus, in hacker parlance the term excludes compilers, program editors, games, and messaging systems, though a user would consider all those to be apps. (Broadly, an app is often a self-contained environment for performing some well-defined task such as `word processing'; hackers tend to prefer more general-purpose tools.) See killer app; oppose tool, operating system. >.APPLE SHARE:a network o/s devloped by apple to work with other macs,like win nt and win ME are desined to work the together. >ARCHIE:a client/server program that is used to locate files on anonymous ftp. >.ARCHIVE:a place with important files on the net. >AREA CODE:area code is the code for a phone number for ppl accesing it outside the city,dial up hacking or connecting to your isp involves uses an area code. >.ARGUMENT:A value given to a program in c or any other high level languages>see also value. >.ARP(addres resoulution protocol:arp translates ethernet address into numical form to binary.all o/s support arp by typing arp in the command prompt. >APRAnet(advanced research projects agency network)is a denfence agency network created by defense department of the USA known now as da-apra >ARM(application response measurement): >.ARRAY:a collectiong of similar info such as codes,text or other items.All items are usally of the same type,used in programming. >.ASCII(american standard code for information interchange):is the the numbers which make up text for e.g the code 52 would be the number 4 >ASCII ART: n. The fine art of drawing diagrams using the ASCII >ASM(asembly language):is a low level program language which is used for writting small programs and can be used to write viruses.Assembly Languages have the same basic structure as Machine Languages, the difference is that Assembly Languages allow the programmer to use names instead of numbers. As with Machine Languages, every CPU has its own unique machine language. Programs must be rewritten or recompiled, therefore, to run on different types of computers. Nowadays most programming is done with High-Level Programming Languages but in the early days, Assembly language was always used, now it is ONLY used when speed is essential or when the task isn't possible on the High-Level Language we are using. These are considered Low-Level Languages as they are closer to Machine Languages. >ASYNCHRONOUS TRANSFERE METHOD:A connection-oriented data communications technology based on switching 53 byte fixed-length units of data called cells. Abbreviated ATM. Each cell is dynamically routed. ATM transmission rates are multiples of 51.840 Mbits per second. In the United States, a public communications service called SONET uses ATM at transmission rates of 155, 622, 2048, and 9196 Mbits per second. These are called OC-3, OC-12, OC-48, and OC-192 respectively. A similar service called SDH is offered in Europe. ATM is also used as a LAN infrastructure, sometimes with different transmission rates and coding methods than are offered with SONET and SDH. >AT&T:american phone company there are also the makers of unix,at&t owns the bells lab which wrote unix and c. >AUTHENTICATION: A security measure for verifying the identity of network users. >AVATAR:The body in cyberspace. In most cases the handle/nicknames you use on the Internet, and the personality that goes with it. >AWK: [UNIX techspeak] An interpreted language for massaging . >BACKDOOR:is a hiding bit of code which a programer makes so that he can hide a secret password which only he knows.>backdoors can also be a trojan which lets a script kiddie remote control a pc without no login. >.BANDWITH:the speed of which is sent to the moniter meguared in hertz. >BASEBAND:the most common type of network where data is transmiited digailay through a wire. >.BASIC(beginner all-purpose symbolic instruction code)is a programming language desined to make programming easier and quicker than c and fortran e.t.c.,modern verions of basic are visual basic and quickbasic. <BASH:is a linux command interface like windows ms dos but with more power. 24.BATCH FILE(.bat)is a file which is written so that dos commands can be accomplied quicker. >BAUD RATE:is usally related to the speed of the modem for.e.g 56k. >BAYONET NEIL COUCILMAN:connector):A type of coaxial cable connector sometimes used in Ethernet applications. Abbreviated BNC. The specification for BNC connectors is contained in EIA/TIA 403-A and MIL-C-39012. > BER(Bit Error Rate.): >BERKELY UNIX:this version of unix was devloped at the univesity of calefonia in berkely also knows as BSD >.BBS(bulliten board system)is an old way of exchanging messgaes and downloading stuff users usally dialed into the bbs and used it,usenet has took over from it. >.BIN:a binary file.Also on unix the binary files are usally in /bin and on windows c:\windows >.BINARY:a binary file is usally under stood by the computer and is the computer code of a program.binary is written in 0's and 1's. >BIND:The SNA command that starts an SNA session between two logical units. >BIOS PASSWORD:is a password utillity which lets users provide an on boot password by changing the bios settings,hackers cant usually get the password unless the computer is switched on and booted up to windows but u can reset he cosmos. <BIT MASK:a pattern of binary values. 28.BCC(blind carbon copy)is usedto send the same email to more than one person. >BLACK ICE:is a monetering program used for watching ports. >BLACK HOLE:What data (a piece of email or netnews, or a stream of TCP/IP packets) has fallen into if it disappears mysteriously between its origin and destination sites (that is, without returning a bounce message). >BLACK SCREEN OF DEATH:On an attempt to launch a DOS box, a networked Windows system not uncommonly blanks the screen and locks up the PC so hard that it requires a cold boot to recover. This unhappy phenomenon is known as The Black Screen of Death. >BLUE SCREEN OF DEATH:is when a windows machine crahses or gets nuked and shows the blue screen which shows that an error has occured. >BLUE BOX(not a hacker term but i will mention it): Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreakers built devices called `blue boxes' that could reproduce these tones, which could be used to commandeer portions of the phone network. (This was not as hard as it may sound; one early phreak acquired the sobriquet `Captain Crunch' after he proved that he could generate switching tones with a plastic whistle pulled out of a box of Captain Crunch cereal!) There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. 2. n. An IBM machine, especially a large (non-PC) one. >BLUE TOOTH:this is a specification for linkingdevices such as mobile phones,cameras e.t.c to computers over a short range wireless connection. <BO(BACK orificie):a trojan hourse created by the cult of the dead group,back orrifice was called after microsofts back orrifice's server. <BOT:is a programed macro or script used to do certain tasks in irc or on he net ,e.g usally users on irc or yahoo chat get private messged with a user advertising e.t.c but its not a user but is known as a bot. >.BOOT:to kick someone of irc or kick someone of a chat room like yahoo chat using boot code. <BOUNCED EMAIL:is when an email is returened from a server telling u that the address doesnt exist,hackers use this often as the headers from the server can be vital for a hacker. >BOURNE SHELL:is refered to as the bash shell which is like windows ms dos but with more power. >BOX:is refered to as the o/s a user or host is on e.g windows box. >BOXES:A variety of electronic devices used to aid in phreaking. >.BPS(bits per sec) >BRACKET PROROCOL:The SNA rules for the initiation of a bracket between two LU-LU half sessions. Brackets delimit bi-directional data flows for transactions. >BRIDGE:a connectivity device that fowards data based on physical networks. >BROUTER:a connectivity device that routes routable protocols and bridges non routable protocols. >BROWSER:A program specifically designed to help users view and navigate hypertext, on-line documentation, or a database. While this general sense has been present in jargon for a long time, the proliferation of browsers for the World Wide Web after 1992 has made it much more popular and provided a central or default techspeak meaning of the word previously lacking in hacker usage. Nowadays, if someone mentions using a `browser' without qualification, one may assume it is a Web browser. >BRUTE FORCE:to try thousand of differnt passwords on a login prompt or on a password protected file. >BSD:a unix o/s from berkely;s >.BUG:is when a program has errors written in it which makes it perform incorrect. >Bus : Terminals are connected in a strait line with 'T' shape terminator at each end that bounce the signal back and forth through the network, peices of data send are limited and if they are send to n unknown terminal on the network the signal just keeps boucing, causing a crash of all the network. The Bus network is a peer to peer network and had no dedicated server. >BUS NETWORK:is a network where all computers are connected through a hub and each computer usuall has a network interface card. 33.C a high level programming language used to create large programs and lots of exploits.e.g #include <stadio.h> main ( ) { printf ("you are viewing the beta version.\n"); printf ("www."); } >.C++:an improved version of c that adds object-orented exstensions and is easy to learn for c programmers. >CCC [Chaos Computer Club]:A hacker-organisation in Hamburg. They have meetings, lectures and annual congresses which attracts hackers from all Europe. They also publish books and magazines about the information society. There are a lot of myths of which kind of criminal activities they have been involved in, so it's hard to say which of them is true and which are not. >C SHELL:is a shell similar to the bash shell but it is more like the c langauge on a command promt. >.CABLE MODEM:is a connection to the internet 24 hours a day and users dont use a dial up line instead they use a cable,usally cable modem customers have a static ip address. >CACHE:is a tempory folder on a hard disk which stroes websites e.t.c so that a user can acces them quicker. >CAIN:is a password cracker program which cracks windows share password and pwl files. 36.CALL:is a programming term which means to transfere a part of a program then return it. <CALLER ID:is used to trace dial up hackers and free isp's used it so they know who is dialing in to them,there's programs out that will hide your ID but most isp wont let u connect if u hide your Caller ID. >.CARRIIER(dial ups): a signal used by a modem to detect another modem. >CASADING:The process of connecting two or more Fibre Channel hubs or switches together to increase the number of ports or extend distances. >.CAT:a unix command which displays the contents of a file. >CC(carbon copy)used for sending the same email to more than on person. >.CD:change directory used for chaging the dir on all systems prompts also chdir <CERT:is a Securuty firm which started in 1988 to help network admins and publish network securit information. >.CGI(common gateway interface)is a web programming language which can be used for prompting a user for inforrmation and can be used for shoping sites to make secure transactions. >CHANNEL:is a irc chat room where ppl chat. >CHANNEL OP:is the person or person's on a channel who control it. >CHAP(challenge handshake authentication protcol): >CHAR:shorthand for `character'. Esp. used by C programmers, as `char' is C's typename for character data. >.CHAT:ovisly u know what a chat room is but certain network administraters have chat built into their security which means if there hacked they can disconnect u then chat and tell u that your traced e.t.c >CHECKSUM:a 16 bit calculated field used to ensure detection of currupted datagrams. >CHERNOBYL PACKETL:A network packet that induces a broadcast storm and/or network meltdown, in memory of the April 1986 nuclear accident at Chernobyl in Ukraine. The typical scenario involves an IP Ethernet datagram that passes through a gateway with both source and destination Ether and IP address set as the respective broadcast addresses for the subnetworks being gated between. Compare Christmas tree packet. CIRCLE:This is also a simple setup and poses most of the same problems as the bus NET. Basically, it is just a Bus NET with the two spare ends connected to each other. The main differences between this and the Bus NET is that, each computer acts as an amplifier to the signals passed along it (Active). There is also another communication method used here called token passing. This consists of a token passing along the network, when a computer wishes to pass on information, it will be attached to the token the it will travel round the network until it finds its destination,. The destination will then pick it up copy it and send a new token into the network. If the information in a Circle NET does not find its destination, then it will go in a complete circle and return to the sender with a message, reporting the problem. This type of topology is very similar to the Bus NET with the same drawbacks and the same advantages >CLUSTER CONTROL:The common name given to SNA Type 2.0 Peripheral Nodes. Usually used to refer to 3270-type control units. >CODEZ D00DZ:HACKERS's version of pirates. >COMMUNICATION CONTROLER:An SNA communications processor whose operations are controlled by Network Control Program (NCP) software.Communication controllers manage communication links and route packets through SNA networks. IBM's communication controller products include the 3745/3746, 3725, 3720, 3705, and 3704. >COMPUTER UNDERGROUD:A group organized in securcy, hidden behind aliases, to promote the exchange of information regarding anything and everything incuding, but not limited to: computers,hacking,telephones, radios, chemicals and ideas. >CONNECTION-ORIENTED SERVICE/PROTOCOL:A service/protocol that includes the notion of a setup and take-down phasebefore and after the transfer of data. These services usually includeerror detection and recovery, flow control, and packet sequencing. >CONNECTION SERVICE/PROTOCOL: A service protocol that does not include the notion of a setup or take-down phase before and after the transfer of data. Each message, commonly called a datagram, is sent as a separate entity. >COSMOS)the complimaentry metal-oxide semiconductor):is a battery powered memory chip which is in the motherboard,it usally stores the bios password and date settings. >.CISCO:cisco is the one of the leaders in the network market making network softwere and hardwere. >CLASS C/B/A>NETWORK:is the way ppl are given an ip address from their isp or network proider,class c is the isp way for an ip address >CLI(Command line interface):is also known as an interface were u type commands such as in dos. <CLIENT:is a user who connects to a server. <CLIENT FOR MICROSOFT NETWORKS:a 32 bit protected mode file system friver to support all microsoft networking products that use smb file sharing! <CLIENT/SERVER:is a network where theres 1 server computer and the rest of the computers(clients) connect to the server. >CMIP:Acronym for Common Management Information Protocol. >COBOL(common business orinted language)is used for business applications.cobol is rarely used now. >.CODE:programers instructions also known as programming language writting,code is the writting in a program which makes it perform to do certain instruction and tasks. >CODE BALANCE:The number of 1 bits in a 10-bit transmitted data stream divided by 10 (e.g., 1110100011 has a code balance of 6/10 = 60%). >.COLLIO:is a US hacker cracker who nuked yahoo.com and ebay in early 2000. >.COM PORT:is a port on your computer were modem usally connect to. >.COMMAND PROMPT:is the screen on an o/s which u can type commands e.g microsoft dos,lilo prompt,bash,csh prompt. >.COMPILE:to convert programming code into machine language. >.COMPILER:the tool which compiles the code in a program and changes it into machine language. >Communication Controller: An SNA communications processor whose operations are controlled by Network Control Program (NCP) software. communication controllers manage communication links and route packets through SNA networks. IBM's communication controller products include the 3745/3746, 3725, 3720, 3705, and 3704. >.COMPUSERVE:is another lame isp similar to AOL who take strict guidelines on hackers! >Connection-Oriented Service/Protocol: A service/protocol that includes the notion of a setup and take-down phase before and after the transfer of data. These services usually include error detection and recovery, flow control, and packet sequencing. >CONNECTION PROTOCOL:a protocol tat transmities data without operating through a connection <CONFIGARTION:The process of installing or removing hardware or software components required for a system or subsystem to function. Assignment of the operating parameters of a system, subsystem or device. Disk array configuration, for example, includes designating the array's member disks or extents, as well as parameters such as stripe depth, RAID model, cache allowance, etc. The collection of a system's hardware and software components and operating parameters. cf. array configuration, physical configuration. connection >CONSOLE:A device for graphical or textual visual output from a computer system. In systems, network and device management, an application that provides graphical and textual feedback regarding operation and status, and that may accept operator commands and input influencing operation and status. Sometimes called enterprise management console. >COPY ON WRITE:A technique for maintaining a point in time copy of a collection of data by copying only data which is modified after the instant of replicate initiation. The original source data is used to satisfy read requests for both the source data itself and for the unmodified portion of the point in time copy. cf. pointer remapping >Contention-Based Network : Network that sends a limited amount of data and holds other data in a queue until it s ready to send it. The name means, that all data being sent is competing or contending for bandwith. The ALOHA Radio system in 1968 was based on this. >.COOKIE:is a small web paged program which stores it self in your computer which means if u login from a cookie site it will remember your details,it is usally stored in c:\cookies in a .txt file. . >COPY:to copy a file on an o/s windows e.g is copy filename filename unix e.g is cp /filename /filename >COAXIAL CABLE:An electrical transmission medium consisting of two concentric conductors separated by a dielectric material with the spacings and material arranged to give a specified electrical impedance. cf. triaxial cable >CP/M:is an old o/s used back in the 70's >CRACK:To remove software copy protection on a program such as using a sharewere program for longer than it was ment to be used.. <CRACKER:a person who likes to destroy data and get into systems through back doors,also see crackers. >CRACKERS:is a gay man who likes talking it up the ass.......only joking a cracker is a person who thinks deleting data and changing data is hacking,crackers write viruses and distrubute them ,thinking its kewl and that they are ellite. >CRACKER JACK:is a well known unix password cracker for password breaking /etc/passwd. >CSMA/CD:the network method used by ethernet networks. >CYPER PUNK:Since 1990 or so, popular culture has included a movement or fashion trend that calls itself `cyberpunk', associated especially with the rave/techno subculture. Hackers have mixed feelings about this. On the one hand, self-described cyberpunks too often seem to be shallow trendoids in black leather who have substituted enthusiastic blathering about technology for actually learning and doing it. Attitude is no substitute for competence. On the other hand, at least cyberpunks are excited about the right things and properly respectful of hacking talent in those who have it. The general consensus is to tolerate them politely in hopes that they'll attract people who grow into being true hackers. >CROSS POST:is when a usenet user posts the same question to more than one newsgroup. >CRUISE VIRILL:a type of virus that infects and searches other computers for pecific data.for e.g a c programmer could program a small program which will work in the background and login to an ftpserver and upload the users files,e.t.c >CSH:is yet another command enviroment for unix. >CSMA/CD:(Carrier Sense Multiple Access with Collision Detection.) >CRYPTGRAPHY:see encryption >CYPERPUNK:Net.person who has evolved from hacking to encryption and concern with creating multiple identities. >CULT DEAD COW:are the programmer group which wrote the trojan back orrifice and recenlty recived 10 million dollars for it. >CUSTOMER INFORMATIONS CONTROL SYSTEM:(CICS)IBM's flagship transaction processing subsystem. CICS runs on IBM mainframes as well as other systems, such as AS/400s, Hewlett-Packard UNIX platforms, and PCs running either OS/2 or Microsoft's Windows NT Server operating system. >CUTE FTP:is an ftp client used for contacting ftp servers,cute ftp is a freewere and can be download from download.com >DAEMON:a process runs in the background and not locked into a terminal,webservers are ferffered to httpd as the server sits in the background and does need watched. >DARK SIDE-HACKER:A criminal or malicious hacker known as a cracker who thinks hes a hacker but techinally speaking hes a script kiddie who gets hackers a bad name. >DATA ENCRYPTION STANDARD:an government specification for encoding files by using a password.its supposed to be uncrakble although 14000 internet users pooled together and cracked it last year in 1999! >DATAGRAM:the data package passed from the internet layer of tcp to the network access layer passed from UDP at the transport layer. >Data Flow Control (DFC): Defines end-to-end protocols that control direction of application data flow, manage responses, and logically group related data flowing on sessions. >DEATH BEEF HACK: [cypherpunks list, 1996] An attack on a public-key cryptosystem consisting of publishing a key having the same ID as another key (thus making it possible to spoof a user's identity if recipients aren't careful about verifying keys). In PGP and GPG the key ID is the last eight hex digits of (for RSA keys) the product of two primes. The attack was demonstrated by creating a key whose ID was 0xdeadbeef >DEAD BEEF:DEAD: The hexadecimal word-fill pattern for freshly allocated memory (decimal -21524111) under a number of IBM environments, including the RS/6000. Some modern debugging tools deliberately fill freed memory with this value as a way of converting heisenbugs into Bohr bugs. As in "Your program is DEADBEEF" (meaning gone, aborted, flushed from memory); if you start from an odd half-word boundary, of course, you have <DEBIAN:is an advanced version of linux which is more hacker freindly than other versions . >DECRYPTION:to un decrypt a file which is encrypted! >DEFAULT GATEWAY:the gateway used to connect to the rest of the network. >DELETE:to destroy data the dos command for it is deltree the unix command for it is rm. >DELPHI:a programming langauge devloped by borland. DEN(Directory Enabled Network.: >DEMON:A portion of a program that is not invoked explicitly, but that lies dormant waiting for some condition(s) to occur. See daemon. The distinction is that demons are usually processes within a program, while daemons are usually programs running on an operating system. 2. [outside MIT] Often used equivalently to daemon -- especially in the Unix world, where the latter spelling and pronunciation is considered mildly archaic. Demons in sense 1 are particularly common in AI programs. For example, a knowledge-manipulation program might implement inference rules as demons. Whenever a new piece of knowledge was added, various demons would activate (which demons depends on the particular piece of data) and would create additional pieces of knowledge by applying their respective inference rules to the original piece. These new pieces could in turn activate more demons as the inferences filtered down through chains of logic. Meanwhile, the main program could continue with whatever its primary task was. >DEMON DIALER:a modem program which dials from say 555-0000 on up through 555-9999,finding computers with modem support.this is a way a hacker would find an phone support o/s in your area alsoknown as a wardialer. >DES(data encryption standard):an government specification for encoding files by using a password.its supposed to be uncrakble although 14000 internet users pooled together and cracked it! >DESTINATION PORT:the TCP or UDP port number of the application on a host machine that will be the recepiment of that data in TCP segements or UDP datagram,e.g a webserver waiting for website visitors. >DEV/MILL:a dir on unix which does nothing,produces nothing and can slowwing anything,usally linux is stored there, >DEVICE CHANNEL:A channel used to connect storage devices to a host I/O bus adapter or intelligent controller. The preferred term is device I/O bus. >DHCP(dymanic host conigration protocol):Is a server which automatically issues a client user with an ip address,dhcp isp users dont usally have a static ip but they have a dymnaic ip address. >DIRECTORY:A mechanism for organizing information. A file or other persistent data structure in a file system that contains information about other files. Directories are usually organized hierarchically (i.e., a directory may contain both information about files and other directories), and are used to organize collections of files for application or human convenience. An LDAP-based repository consisting of class definitions and instances of those classes. An example of an enterprise-wide LDAP directory is Microsoft's Active Directory (AD) or Novell's NetWare Directory Service (NDS). directory enabled network . >DISTRO:anyone can release their own linux and its called a linux distro. > DRIVE LETTER:A single letter of the alphabet by which applications and users identify a partition of physical or virtual disk to the Windows operating system. The number of letters in the alphabet limits the number of disks that can be referenced. >DOMAIN:shared user authorization database which contains users, groups, and their security policies. A set of interconnected network elements and addresses that are administered together and that may communicate. domain controller,common ones include website names. >DOS:a command based o/s in windows. >DoS(denial of service):is when a script kiddie nukes or send thousand of data to a server causing it to crashe >DOWNLAOD.COM:is a website where u can download almost any program or file,www.download.com is owned by cnet and it also own sharewhere.com. >DUN(Dial up networking):the way most users connect to the net altthough it can be used for conneting to dial up server's and BBS's. >.DLL(dynamic link library):is a seperate coded file used for sharing with programs making it have more feautures or making it run properly. >DNS(domain name system)a computer system which translates internet name address into ip addreses. <DNS SPOOFING:is when a server has it's dns id faked so it goes to the wrong page or server. >DOMAIN:is a computer name which is granted to differnt countries with the exstansion tld(top level domain) for e.g .co.uk .com companys and business sites -------------------------------------- .edu for education sites. -------------------------------------- .gov for government computers. --------------------------------------- .mil for militry computers -------------------------------------- .net for networks and company's ---------------------------------------- >DR DOS:an ms dos clone owned by novell. >DUMB TERMINAL:a keyboard and video display connected to an network. >DWEEB:quite like a lamer but there anti-socialer. >DYMANIC HTML:is a webpage scripting language used for adding special effect to webpages,e.t.c,similar to javascript. >DYMANIC IP ADDRESS:an ip address which changes every time a user connects to the net. >ECHO:can be used as icmp but mostly echo repeats a character to screen e.g "/echo <lamer> i am and ass in "irc or "echo hi" in dos. >ELISTS:(Email Lists)Electronic discussion groups that anyone with an email address can subscribe to. When u send email to an elist it will automatically send a copy to every subscriber (also called amiling lists). >ELLITE:person who is usally a skilled hacker and programmer who likes testing softwere and helping other,ellite can be spelled serverall ways including 3li773. >ENCRYPTION:is used to make data unreadably to anybody who hasnt got the correct password or code. >ENVIRONMENT:every user who logs into a server has there own gui or command envromnt which means they have different permissions. >ENDLESS LOOP:a set of code in a prgram which repeates something. >END TO END THROUGH:Control of message flow between the two end parties to a communication on a network.Flow control that occurs between two connected Fibre Channel N-Ports. >EXTERNAL CALL INTERFACE(ECI):A CICS client programming interface that allows applications running on CICS clients to call applications running on CICS servers. >ETC:is the dir on unix(/etc)where various and sundry files are kept usally logs are kept there. >ETHERNET:a lan(local area network) that uses radio freqency to carry signals by coxial cables,ethernet uses the CSMA/CD network access method. >ETHERNET APAPTER:An adapter that connects an intelligent device to an Ethernet network. Usually called an Ethernet network interface card, or Ethernet NIC. cf. NIC >ETTIQUATE:is the rules of the net for e.g typing IN ALL CAPS IS REGUARDES AS SHOUTING. >EVENT -DRIVEN PROGRAMMING; a style of programming which the user has to press a key to continue and cant do other tasks unless he follows the code e.g. in batch code. @echo off dir /w c:\windows deltree /y *.pwl pause dir c:\ exit >EXE.is a file enstension which can be executed to run a program. >EXECUTE:is to issue a command or program on a system. <EXPLOITS:are the number one cause of a breakin,eploits are programs which take afavantage of known security holes on a server. >EXSENSION:are the filename exstension at the end of a program such as .com,.exe,.bak >EZINE:A net version of the small press magazine (known as zine) culture. Usually ezines exists only on the Net, but more and more paper zines are distributing an electronic version as well. >F.A.Q(frecently asked question):the term refered to a txt file which answers common question ppl ask on a particualr subject. >FC-PH:The Fibre Channel physical standard, consisting of FC-0, FC-1, and FC-2. >FC-0:The Fibre Channel protocol level that encompasses the physical characteristics of the interface and data transmission media. Specified in FC-PH. >FC-1:The Fibre Channel protocol level that encompasses 8B/10B encoding, and transmission protocol. Specified in FC-PH. >FC-2:The Fibre Channel protocol level that encompasses signaling protocol rules and the organization of data into frames, sequences, and exchanges. Specified in FC-PH. >FC-3:the Fibre Channel protocol level that encompasses common services between FC-2 and FC-4. FC-3 contains no services in most implementations. >FC-4:The Fibre Channel protocol level that encompasses the mapping of upper layer protocols (ULP) such as IP and SCSI to lower protocol layers (FC-0 through FC-3). For example, the mapping of SCSI commands is an FC-4 ULP that defines the control interface between computers and storage. >FEDERATED MANAGEMENT ARCHITECHTURE SPECIFICATION:A specification from Sun Microsystems Computer Corporation that defines a set of Java APIs for heterogeneous storage resource and storage network management. This specification is a central technology of JIRO. >FDDI(Fiber Distributed Data Interface.):a token passing network archtitecture using fibre optic cables. >FDDI ADPTER:An adapter that connects an intelligent device to an FDDI network. Both FDDI-fiber adapters that connect to optical fiber FDDI networks, and FDDI-TP adapters that connect to twisted copper pair FDDI networks exist. Although network interface cards are usually referred to as NICs rather than as adapters, the term FDDI adapter is more common than FDDI NIC. cf. adapter, NIC >FIBRE CHANNEL:A type of Fibre Channel physical connection that allows up to 30 meters of copper cable between adjacent devices.. >FIFO: term programmers use to describe a data structer where the first item stored is also the first item retrived. >FILE HANDLE:a number used to identify a file inside a program. >FILE SERVER:a file server is a computer which acts a server allowing users to access resources on it.for e.g on windows users can share there drives using netbios. >FILE SHARING!:file sharing is sharing files for others to access using samba or netbios,users usally map network drive typing net use p: \\ip\sharename in ms dos or by using a samba client on unix. >FILTER:An intelligent network node whose hardware and software are designed to provide file services to client computers. Filers are pre-programmed by their vendors to provide file services, and are not normally user programmable. cf. appliance, file server >FIN:a control flag used in the process of closing a TCP connection. >FINGER:is a service run on port 79 and allows users to find information on users on hosts such as name and address,tel....,e.t.c >FIREWALL:is a program used to close a pc'a open ports and secure security holes and is a break point between networks where all the trafiic is examined and accepted or denied based on a set of rules. >FLAME WARS:are when 2 or more ppl post or send shit to the other user,and the both users exchange angry messgaes to each other.<irc invloves a lot of flame war between hackers and lamers usally the lamers are nuking e.t.c >FORTH: another programming language although its not relay used now a days.. >FORTRAN:a combination of formular translator which allows programmers to use mathematical signitures.e.g code x = (A * B) * >FREEBSD:is a version of unix with open source. >Fragmentation scanning : This is not a new port scanning method in and of itself, but a modification of other techniques. Instead of just sending the probe packet, you break it into a couple of small IP fragments. You are splitting up the TCP header over several packets to make it harder for packet filters and so forth to detect what you are doing. Be careful with this! Some programs have trouble handling these tiny packets. My favorite sniffer segmentation faulted immediately upon receiving the first 36-byte fragment. After that comes a 24 byte one! While this method won't get by packet filters and firewalls that queue all IP fragments (like the CONFIG_IP_ALWAYS_DEFRAG option in Linux), a lot of networks can't afford the performance hit this causes. This feature is rather unique to scanners (at least I haven't seen any others that do this). >FTP(file transfere protocol)is a serivice which runs on port 21 an allows users with valid accounts to login and upload files and download files. >FTP BOUCE ATTACK: An interesting "feature" of the ftp protocol (RFC 959) is support for "proxy" ftp connections. In other words, I should be able to connect from evil.com to the FTP server-PI (protocol interpreter) of target.com to establish the control communication connection. Then I should be able to request that the server-PI initiate an active server-DTP (data transfer process) to send a file ANYWHERE on the internet! Presumably to a User-DTP, although the RFC specifically states that asking one server to send a file to another is OK. Now this may have worked well in 1985 when the RFC was just written. But nowadays, we can't have people hijacking ftp servers and requesting that data be spit out to arbitrary points on the internet. As *Hobbit* wrote back in 1995, this protocol flaw "can be used to post virtually untraceable mail and news, hammer on servers at various sites, fill up disks, try to hop firewalls, and generally be annoying and hard to track down at the same time." What we will exploit this for is to (surprise, surprise) scan TCP ports from a "proxy" ftp server. Thus you could connect to an ftp server behind a firewall, and then scan ports that are more likely to be blocked (139 is a good one). If the ftp server allows reading from and writing to a directory (such as /incoming), >FUNCTION:is a subprogram or small program which does a certain task then returns the answer to the main program. >GANG MESSAGES:spam messages posted to usenet or emailed to users. >GATEWAY:the link that translates two different types of computer networks,a router which connects a lan to a larger network. >GEEK:is a person who knows more about computers than he does know on his self,geeks are usally anti social and ugly ppl. >GREP:referred to as search or scan. >GNONME:is a linux desktop environment built by hacker and is similar to kde. >GOPHER:a system used for finding info on the net,named after the university of minesota's golden gophers. >GOTO:is a common programming code e.g. code written in qb. print "wassup" input "well!" name$ if name$ = kev then GOTO celtic ........ .............. .. end >GROUP:A collection of computer user identifiers used as a convenience in assigning resource access rights or operational privileges. >GSN:Acronym for Gigabyte System Network. >GUI:Acronym for Graphical User Interface. >GURU:is a knowledgeble computer dude usally earn mega cash and studies network security and hacking!. >HACK:a hack is a sucessfull piece of code which has been changed or it can be when a hacker sucessfully hacks a system througn an exploit or using BF, e.t.c >HACKER:are the dudes who make the internet what it is,most of the hackers program and contrinute to the linux world and most of them like to study network security and breaking into systems. >HANG UP:used by war dialers once a dial toned is found. >HAYES COMMAND SET:a set of instruction for controling basic functions like dial modems then hanging up. >HIDDEN FILES:all o/s have hidden files by default to stop newbies messing them up,although when u hack a system it is hard to find hidden file but the unix command "ls -vat /dir" finds hidden files. >HEXADECIMAL:a number that uses base 16 to base 10. >HEXEDITOR:is a program used for viewing the computer binary code of a program. 105.HIGH LEVEL LANGUAGE:is a program language which can almost be written in english High Level Languages are closer to Human Languages, and because of this, they are easier understood, easier written, easier maintained and adjusted. The problem with High-Level Programming Languages is that they lack slightly in speed compared to the lower languages, the reason for this is that the Compiler has to convert the High-Level code into Machine Language before the computer reads it and follows the instructions. The first of these languages started to emerge around the 1950's and there are now tons of them around like Pascal, C and C++. >HOME:is the default directory u get as soon as u login to unix.usally /root or /home/user >HOST:is a computer which stores files and is referred to each hackers target !the host computer! >HOST ID:the portion of an ip that identifies a particular computer within a network. >HOST TABLE:the host or lmhost file that contains a list of knownip addresses mapped to host names or netbios computer >HOTMAIL:is a free email site which has the largest number of users than anywhere in the world,usally because is has so much users and the owners "microsoft" make it hard to hack beacuse micosoft invests a lot of cash in it the security of bug tracking!. >HTML(hyper text markup language):is a the most used scripting language for programming web pages as it is easy to use.e.g <HTML> <HEAD> <TITLE>wassup</titile> </head> <body> <p>adolf hitler was a very naughty man!</P <hr > <a href="telnet://unix.com">telnet me</a> >HTTP:is run on port 80 and is known as www,http is known as hyper text transfer protocol. >HYPERTERMINAL:is a windows communication program used for contacting bbs's and it can be used as a telnet client as well. >HUB:a device on a network where it connects all the pc's togthers using their wires and connecting them to the hub. >IBM:internation business machine:is a computer firm which lead in the making of computers,ibm also have one of the strongest security networks in the world. >ICE:(Intrusion Countermeasure)Term reffering to the security programs in Gibson's cyberspace (also called BLACKICE). >IDENITY HACKING:The use of pseudo-anonymity or false accounts to put oneself off as another person on the Internet. >IDLE:when a computer isnt doing nothing,usally thats the best time to start hacking! >ILLS:is a more than a webserver is helps u create websites configure ftp and stmp ,e.t.c <ICMP(internet control message protocol)is used for when u ping a hosy e.t.c >ICMP echo scanning :This isn't really port scanning, since ICMP doesn't have a port abstraction. But it is sometimes useful to determine what hosts in a network are up by pinging them all. the -P option does this. ICMP scanning is now in parallel, so it can be quite fast. To speed things up even more, you can increase the number of pings in parallel with the '-L ' option. It can also be helpful to tweek the ping timeout value with '-T '. nmap supports a host/bitmask notation to make this sort of thing easier. For example 'nmap -P cert.org/24 152.148.0.0/16' would scan CERT's class C network and whatever class B entity 152.148.* represents. Host/26 is useful for 6-bit subnets within an organization. Nmap now also offers a more powerful form. You can now do things like '150.12,17,71-79.7.*' and it will do what you expect >IETF(internet enginerring task force):a consortuim that introduces new tchnologly on the ineterne,they rite rfc's. >IF:is a progaramming statment which is often used with IF and THEN e.g. code if X = 5 then print "i am a faggot!" >IGMP(internet group manahement protocol):a tcp/ip protocol used in conjuction with multcasting in a class d network. >INDEPENDENT LOGICAL UNIT:An LU that does not depend on an SSCP in an SNA host system for session initiation and can send both a BIND request and a BIND response. Only LU Type 6.2 LUs can function as independent LUs >INHERITANCE:is used in object orented programming languages,when one object copies the feauture from another object. >INODE:A persistent data structure in a UNIX or UNIX-like file system that describes the location of some or all of the disk blocks allocated to the file. <INTERNET:is the biggest network in the world which has thousands of features such as global chat rooms and newsgoups,telnet/e.t.c/e.t.c. >INTERNET EXPLORER(IE):is a web browser owned by microsoft and it distributes as a free were product to anyone who want to download it.IE is the msot used in the market at 75 per cent domination form rival browsers like netscape. >INTERNET SERVER APPLICATION PROGRAMMING INTERFACE(ISAPI): A programming interface that allows a Microsoft Internet Server to execute server-based application programs. >INTERNIC:is the place of internet information center were ppl are more or less in charge of the net,they also assign ip address to isp's and websites,internic can be used to track down ip addreses using their "whois query". >INITIAL SEQUENCE NUMBER(isn):a number that marks the beginnging of the range of numbers a computer will use for sequence bytes transmiited through TCP. >INTRANET:is a small vesrion of the internet except it isnt public and is only on LAN'S >INTRUDER:is when a hacker or unathorised user breaks into a part of the system which is forbidden for user access. >I/O OPERATOR:A read, write, or control function performed to, from or within a computer system. For example I/O operations are requested by control software in order to satisfy application I/O requests made to virtual disks. cf. I/O request >IP(Internet protocol):the method for viewing web information and is used for sending packets computers. >.IP ADDRESS:is a 32 bit number giving to every user on the net by their isp,ip addreses can be used to track down users or used by hackers to connect to a system. e.g. an ip address looks like 157.22.111.111,if u still dont understand what an ip address is its basically a number which identifies internet users just like street addreses identify people houses.. >IP SPOOFING:Is when a user fakes his ip address to look like the trusted hosts or makes it look like somebody elses ip address. >IP ROUTING:The process of of recieving an ip packet addreses to somewhere else on one network and sending it on its way from another network. >IPCONFIG:is used in windows 2000 to show a user his ip address,dns server ,e.t.c >IPX/SPX(internetwork packet exchange /seqence packet exchanege):on novell network systems,IPX is a network layer protocol used in file server o/s. >IPX TUNNELING:a method of supporting IPX/SPX on TCP/IP networks by interfacing IPX with TCP/IP's transport layer >IRC:internet relay chat is a place were users can chat and the ppl are usally more ettiquate ,irc clients include pitch,mirc,xchat,irc servers are usally on port 6667. >IRIX:is an o/s similar to unix and mostly used by banks e.t.c >ISDN(intergrated service digital network)is a very fast digital telecommuncation connection with speeds around 128kps. >ISP(internet service provider):is the company which gives u access to the internet and services like usenet,web browsing,telnet.ISP also issue each user an static or dymanic ip address. >JAVA:a programming language devoloped by suns microsystems,java scripts main advantage is it can run on any o/s connected to the internet. >JOHN THE RIPPER:is password cracker used to crack /etc/passwd on unix. >KDE:A POWERfull linux gui which looks like windows but has more power. >.KERNEL:is a hacking term used to describe the core of an o/s or program. 124.KILL:is a c and unix command> >KPPR - (Key Press Password Recorder):A tiny hacking program that is laoded into a computer and then records every key that is pressed. Used to find out login usernames, and passwords (also called Trojan hoarse, Stealth Password Recorder, Key/Keypress Capturer, Password Recorder, Password Sniffer, Password Snooper and Login Spoof). >LAN:is a group of computers connected together through wires or phone lines to share information,LAN are the most common type of network as they are inexensive and easilly configured. >LAN EMULATION:A collection of protocols and services that combine to create an emulated local area network using ATM as the underlying network. Abbreviated LANE. Local area network emulation enab >LDAP(Lightweight Directory Access Protocol.): An IETF protocol for creating, accessing and removing objects and data from a directory. It provides the ability to search, compare, add, delete and modify directory objects, as well as modifying the names of these objects. It also supports bind, unbind and abandon (cancel) operations for a session. LDAP got its name from its goal of being a simpler form of DAP (Directory Access Protocol), from the X.500 set of standards. <LINK:A physical connection (electrical or optical) between two nodes of a network. Two unidirectional fibres transmitting in opposite directions and their associated transmitters and receivers. The full-duplex FC-0 level association between FC-1 entities in directly attached ports. The physical point to point connection from one element of a Fibre Channel fabric to the next or the end to end collection of physical links in a logical point to point connection spanning switches, loops, bridges, etc. Fibre Channel physical layer protocol is a physical link level protocol. >LINK CONTROL PROTOCOL(LCP):a protocol used by ppp to establish ,manage and terminate dial up networking. >LINUX:is a sharewere type version of unix with about 96 per cent of the same feautures,linux as widely used by programmers and hackers because of its security features and of its open source.Hackers usally use linux because it supports all the major programming languages and because it has more power in networking than its rival o/s windows. >LOCAL:is a computer which is in the same building as the other computers on a network,local hackers are hackers within the same network,remote hackers are hackers who hack in from a remote location such as from the other side of the country. >LOCAL TALK:the connecters and cables which make up the apple talk network. >LoD (Legion of Doom):Legendary hacker group of the 90's. >.LOG:is a file which records every ip address which connects to a system and can record the presence of hackers in a system,logs are usally write protected and are the main cause of newbie hackers getting traced. >LOG IN:to gain access to a computer by giving the correct id and password. >LOG OFF:to log out of a computer system once your loged in. >LOGICAL ADDRESS:a network address coniguration though the protocol softwere. >LOGICAL LINK CONTROL SUBLAYER:a sublayer of OSI's datalayer that is resonsible for error checking and managing links between sevices on a subnet. >LOGO:is a programming language designed to show children how to work a pc. >LOOPBACK ADDRESS:127.0.0.1 is refered to every o/s as its own machine,for e.g every computers ip address is always 127.0.0.1. >LOVE BUG:was a worm written by eyespider in visual basic,the lovebug exploited a loop hole in outlook express and then emailed it;s self to every user in the users address book. >LURKER:is someone who read messgages on usenet but doent contribute,almost 90% of users are luckers. >MCAFFE:is one of the world leaders in anti virill programs. >MACHINE LANGUAGE:is the code which the computer understans which is in binary,Aside from computers that utilize programmable micro code (which, by the way we're not covering) 'Machine Language' the lowest level of programming languages These are the only kind of language that computers recognise, although they are almost impossible to read to programmers, mainly because they consist of just numbers. When you write a program in a high level language such as Pascal, the compiler will convert your instructions into this so that the computer understands. And for information's sake, 'Machine Language' is converted to 'High-Level language' by an 'assembler'. Every CPU has its own unique machine language. Programs must be rewritten or recompiled, therefore, to run on different types of computers. >MACHINITOSH:is a make of o/s which started back in the 70;s and is owned by apple corp. >.MACRO:is a program written to record certain tasks and repeat them,macro's are mainly used in MS OFFICE applications and are written in visual basic. >MAIL BOMB.is a from of a DoS attack used by script kiddies to send ppl thousands of emails and block legitement ones. >MANDRAKE LINUX:is a linux distro based on redhat linux,with the same feutures,renound for its newbie freindlyness. >.MAP:is to add a tempory drive to your pc,so that u can access another computers hard drive on a network. >MULTICAST:Allows datagrams to be delivered to a group of hosts simultaneusly. >MBIT(MAGEA BIT): >MBps:Acronym for megabytes per second. A measure of bandwidth or data transfer rate. >MAC(MEDIA ACCESS CONTROL): Algorithms that control access to physiCal media, especially in shared media networkshis is a network setup in no particular fashion, just a Network with every terminal connected to almost every other terminal, although this is easy to maintain and troubleshoot it is very expensive as Its cost a fortune to fit the amount of cables it takes. >MESH:This is a network setup in no particular fashion, just a Network with every terminal connected to almost every other terminal, although this is easy to maintain and troubleshoot it is very expensive as Its cost a fortune to fit the amount of cables it takes. >MIB:Acronym for Management Information Base >MICROSOFT:is the leading o/s company which is owned by bill gates recent microsoft o/s include win 2000 and win melenuim,Microsoft was started by bill gates in seattle as a small business which has now become the richest firm in the world.Microsoft is used by 75% per cent of home owners with a pc and is renound for its easy to use interface. >MICROSOFT SERVICE FOR NETWERE DIRECTORY SERVICES:a service that ennables microsoft client for netwere networks to logon to a novell directroy>see nds >MIME:Acronym for Multipurpose Internet Mail Extensions:A specification that defines the mechanisms for specifying and describing the format of Internet message bodies. An HTTP response containing a MIME Content-Type header allows the HTTP client to invoke the appropriate application for processing the received data. >MINTECK,ROBERT:famous US hacker. >MIRC:is a windows irc client used for talking on internet relay chat. >Multi User Operating System: An Operting system that is capable of Multi-tasking, these are usefull on networks where different people will be logging in, and where printer traffic is high. Some examples of Multi User operating systems are 'Windows NT', 'Windows 2000', 'Unix' and Linux. >MODE:referrs to the attribute to the file whether it is write pretcted,executibal or wrote to. and usuall differnent users have different permission. >MODEM:a device that translates a digital signal to a form of an analogue. >MODERATOR:Is a person who edites or changes usenet postings,chat rooms,e.t.c >MODULE:a module includes softwere that can be loaded or unloaded as u run an o./s. >MONITORING:can be used by hackers or admins to sniff there network for passwords or for proplems it can also be some sort of port watcher device. >MORRIS,ROBBERT: is a famous US hacker who took down the internet usesing his worm name "The morris worm" >.NC:network computer. >MSCONFIG:is a windows utillity for configuring your boot>type msconfig in dos to start it. >MULTIHOMED SYSTEM:a computer with more than one ip address. >MY NETWORKING PLACES:is the new name for network neighbourhood and is used to show all the avalible computers on a windows network. >NAME RESOULUTION SERVICE:a service that maps user friendly names with network addreses. >NAME SERVER:An intelligent entity in a network that translates between symbolic node names and network addresses. In a Fibre Channel network, a name server translates between world wide names and fabric addresses >NAPSTER:is a network program used for sharing and downloading mp3 files. >NAT(netbios auditing tool):is a program coded to password crack netbios shares. NAT(network address translation):A process that lets an entire network connect to a ppp server and appears as a single ip address,ths helping users conceal their ip from exsternal hackers and crackers. NBNS:a netbios name server is a server that provides a netbios name to ip mapping. >Netscape Server Application Programming Interface (Nsap) A programming interface that allows Netscape Web servers to execute server-based application programs. >NETSTAT:is an uttility for displaying all active connections u and the internet also its shows all listing ports.e.g netstat -a in ms dos >NETWORK ARCHITECTURE:a complete specification for a physical network including,specifcatoion for access method,data frame and network cables. >NDISWAN(network driver interface specification wide area network): >NDMP(Network Data Management Protocol.): >NERD:is also like a geek except there more social albe. >NETBIOS(network basic input/outpust system):is a service which listoned on port 139 and is primally used for sharing printers and files. >NETBEUI(netbios exstended user interface):is a protocol included with windows which has an exstended user interface and more features than netbios. NETBIOS FRAMES CONTROL PROTOCOL:a protocol used to configure,enable and disable the netbeui protocol module on both ends of a data link. <NETBIOS NAME:is used to connect to netbios computers e.g net use f: \\mycomputer\c:\ in ms dos. >NETBIOS over TCP/IP(NBT):a component that ennables NETBIOS to function on TCP/IP networks. >NET COMMANDS:are commands used in ms dos for connting to netbios shares,view share name,starting services,e.g net view ,net password,net start,net logon,net use,net ver,net time,net,net /?. >NETIQUATE:the cyber term for ettiqaute. <NETBUS:is a bo like trojan back door used by crackers which all u do is send the victim a netbus file then enter his ip address in to your netbus client and your in his computer ! >NETSCAPE NAVAGATOR:is a web browser with thousands of useful features like IE has but netscape is much less popular,The unix and linux users mostly use it for surfing the internet. >NETMASK:a 32 bit mask which shows how an internet address is to be devided into subnets and host parts. >NETSTAT:is a program used for showing u all your active incoming connections from the internet to your machine,type netstat /? in dos or man netstat for more help. >NETVIEW:IBM's mainframe-based network management software that is used to manage SNA, APPN, and multi-protocol enterprise networks. >NETWATCH:is a windows program used for monitering netbios and it allows users to boot and moniter users connected to the netbios share. >NETWORK:is a system of computers connected to each other through cables or radio transmissions,the biggest network is the internet although there thousands more such as peer to peer,lan,appletalk,smb e.t.c. >NETWORK ADAPTER:Is a network card that ennables a computer to connect to other pc's on a network such as file and printer sharing. >NETWORK ADMINISTRTOR:is a person who maintains a network,looking after the setting and adding new users. >NETWORK DRIVE:is a remote disk drive which looks like your hard disk except is is virtual. >NETWORK FILE SYSTEMS.the NFS protocol uses RPC calls between the offering system of 2 computers to transparritly allow the user on an NFS client computer to access files located on the nfs server. >NETWORK MAPS:The Physical Structure or Layout of the network, >NETWORK SNIFFER:a program that can capture and display the contents of datagrams on a network. >NDMP:Acronym for Network Data Management Protocol. >NIC(network interface card):is a pci or internal network card which allows pc's to connect to a network. >NMAP:is a anonymous port scanner from www.insecure.com/nmap,nmap can also o/s fingerprint,nmap is the leader in public free port scanners and is one of the fastest out. NODE:A system that provides network services, such as routing, management, and end-user support. >NOS(network o/s system):is the softwere which control the network which an e.g of a nos is windows nt. >NEWBIES:is a person who is new to usenet or hacking,newbies make up the large part of hackers and it is the newbie hackers who tend to get cought more easily,newbies often have it easy now a days as theres thousands of hacking programs and tutorials freely avalible on the net.! >.NEWSGROUP:is a descussion area on usenet where ppl post messgaes like emails and others reply. <NFS:network file system:distributed file system and its associated network protocol originally developed by Sun Microsystem Computer Corporation and commonly implemented in UNIX systems, although most other computer systems have implemented NFS clients and/or servers. Abbreviated NFS. The IETF is responsible for the NFS standard. >NNTP(network news transfere protol): the service which usenet messages are sent through. >NNTP SERVER:is the computer which hosts a newsgroup or newsgroups. >NORTON:is a large global company which makes firewalls,system tool,virus scanner and all sorts of heath system programs. >.NOS:network o/s syetem) >NOVELL:is a utah company that makes networking softwere,novell is one of the world leaders in networking products. >NOVELL DOS:is the renamed version of dr dos. >NSA(national security agency):is a top secret american agency which didicates it life to cracking ciphers and monitering communications from all of the world.It even has the knowledge to decompile c and to crack encruption. >NUI(network user interface):is the interface under a network is working. >NUKING:also known as denial of service is used for crashing computers by send thousands of packets to the host causing it to crash. >OCX(ole custom control: >OPEN DATALINK INTERFACE(ODI):a specification defined by novell and apple to provide a protocol for API for communication with network adapter drives and to support the maultible use of protocols by a network >OPEN SOURCE:is refered to softwere with free source code which means it can be changed,Linux is so popular because its all open source wich means you can edit programs to the way u want it. >OPRAH:is an webpage client browser used for internet browsing. >OO(object oriented.) >OOP:object orented programming. >OS/2:a windows like o/s from ibm,microsoft windows is like a clone of os/2 with very much the same features. >OSI(open system connections):is a model which shows data has moved accross a netowork and is made up of 7 layers that the data travels through:application layer,presention layer,sesion layer,transport,layer,,the link layer,and the physical layer. >.o/s(opearting system)is the softwere which a computer runs on,unix,freebsd,linux,windows,applemac,e.t.c are all examples of o/s. >.OVERWRITE:is when a hacker changes or edites the log file or in cracker terms it means to delete data and change it. >OUT OF BAND:Transmission of management information for Fibre Channel components outside of the Fibre Channel network, typically over Ethernet. >OUTLOOK EXPRESS:is an email and newsgroup client used for sending and recieing email and usenet messages. >PACKET:a piece of information typcially used in communcations(modem or network),a packet is a peice of data usally sent from one computer to another.the data is stored in side the packet,along with other information used by what ever protocol under which the packet is being sent. >PACKET SNIFFING:is when a hacker installs a sniffer on the network recording all the network tcp/udp hand shakes and passwords e.t.c,packet sniffing is used by admins as well looking for problem in their network. >PARTION:A subdivision of the capacity of a physical or virtual disk. Partitions are consecutively numbered ranges of blocks that are recognized by MS-DOS, Windows, and most UNIX operating systems. Synonym for the type of extent used to configure arrays. A contiguously addressed range of logical blocks on a physical media that is identifiable by an operating system via the partition's type and subtype fields. A partition's type and subtype fields are recorded on the physical media and hence make the partition self-identifying. partitioning >PASCALL:a programming language mainly used for teaching programming concepts with command that look like regelar english. A high level language, the youngest of the ALGOL family and concidered to be LAME by the hacker community. Originally designed by Professor Niklaus Wirth (1970) as a programming language to teach non-programmers to program. The name originates from the French mathematician Blaise Pascal who invented the first mechanical calculator in 1645. >PASSIVE OPENING:a state in which TCP port is ready to recieve incoming connections,such as a telnet server waiting for users. >.PASSWORD:Is the most common way for ppl protecting data,so that prying eyes cant get in,now aa days theres a lot of password crackers but most admins arent stupis enoguh to use a common password but they use l3tters and n(bers. >PASSWORD CRAKCER:is a program or script used to brute force a password protected computer or file. >PASSWORD PROTECTED:is when u cant access a file or computer without a legitiment password. >PCANYWHERE:is a remote administration program used for contacting your computer when your in a remote destination. >PC DOS(personal computer disk operating system): >PCNFS:A daemon that permits personal computers to access file systems accessed through the NFS protocol. >PDL:is a programming language such as postscript which is processed by a micro processor in the printer. >PEEK:is a BASIC programming language that lets users view a particual file in a computers memory. >PEER TO PEER:is a network where every computer acts as a server ,common e.g would be a windows network sharing files and printers. >PEOPLE SEARCH:is when users try to track users down users with their email address using a ppl search engine such as yahoo people search. >Peripherals - Things connected and shared through a network, like printers and scanners. >PERL:is a scripting language for windows and unix and is used for doing certain tasks such as networking speed testing ,password cracking coding e.t.c >PINE:a terminal based email reader program thats runs on a unix box,it allows users to write and send emails. .>PGP(pretty good privacy):is an encryption package which allows users to encrypt their data so that its unreadably to ppl who cant provide the correct encryption key. >PHREAKING:are another set of underground users who are interested in hacking phones,getting free phone calls,seizing phonelines,call tapping e.t.c,phreaking is rarely did now a days as call companies are too advanced but back in the 70's their was a lot of freaks's. >PHYSICAL ADDRESS:a pernement network address burned into a network adapter by the manufacture >PICO:Is a unix text editor usually abalible by typing pico in a unix shell. >PING:packet internet grouper is used to see if a particualr ip addrees is active and if the computer is on,every o/s supports ping by typing ping ip in the command promt. >PITCH:Is a windows irc client similar to mirc >PL/1:is a earlier programming language used by ibm's in the 70's 1. >PPP(point to point protol):is used for dial up using modems who want to dial into a dial up server>also see slip >POLYMORPHIC VIRUS:is a virus that modefies its self when it effects a file on your computer,this makes it harder for an anti virus program harder to track it. >POP(post office protocol);is a serive which allows a user to retrive email from a mail server such as pop.yahoo.com >POP 1/2/3:is version of pop which sends emails and recieves them unlike stmp which can only send mail.>hotmail.com is an example of pop email client. >PORT:can be 3 things but in hacker terms it is a open target in form as a open service such as 139,telnet,21 which means the hacker can try and exploit them to gain root or get access to windows 98 e.t.c >PORTSCAN:is to scan a computer for open ports,many ppl have different thoughts on this,40% of internet users think this is like going upto a house and checking for open windows and open doors and 60 per cent argue that it legal.A port scan is the first thing a hacker would do on his target system. >POSTSCRIPT: a page scripting language devloped by adobe system. >PPPT(point to point tunelling)a form of ppp which enebles information to be migled with a local area network. >PRINT SERVICE:a service that fulfills network requests to print doc's. >PROGRAMMER:is usally a skilled hacker or individual who has the abuity to write computer programs in code. >PROGRAMMING LANGUAGES:are the computer languages used for writting programs,every language is similar to each other and different languages can only work on certain systems althgough C works on all o/s's,the most poplar languages are VCPP,C,VB,and DELPHI. >PROMPT:is the command environemt on a system which allows u to enter commands. >PROTOCOL:is a set of rules which allows a network to act by the rules,tcp is a hackers best protocol as all o/s support tcp and that means a windows machine can hack a unix.other protocols include udp and xmodem. <PROXY SERVER:is a computer which acts on your behalf,for e.g. if u configure your web browser to use a web proxy the broser will goto the proxy server then the proxy server would goto the site for u and send u the site back to ur broser,this mean that the site can't trace your ip address. >PS:Iis a unix command which shows u the processor status. or what execly is going on on the unix system ur on. >PUBLIC ENCRYPTION KEY:is a unique for of encryption data that requires to set of passwords:a private key and a pulic key.comminly used by PGP. >PYTHON:Another High Level language designed to teach non programmers about strict Sytax Rules, this one is alot more popular than Pascal and is, it is object orientated. Invented in 1990 by Guido van Rossum at CWI in Amsterdam. It was origonally designed with the aim to create an Advanced Scripting Language for the Amoeba System. Name originates from the authors favourate show 'Monty Pythons Flying Circus' further reading: comp.lang.python >QBASIC(quick basic):is a basic langugage version written by bill gates,usally qb is for the beginner programmer,qb is not really a good langugage as it is an event drive language which means u cant do other tasks unless youve did the the tasks in order.e.g code print "qbasic ver 7" input "whats your name!" name$ print "hey "; name$ beep end >QUERY:to search a database for particular information,a hacker usally is interested in the whois query. >QUESO:is a remote fingerprinting uttility for determing an computer o/s. >RAS(remote access server):is a dial up server which comes free with win nt and win 2000. >RCP:a remote file transfere utiility. >READ-ONLY:is a type of storage or file which u can read but not change.Usually read only log files are the cause for hacker getting traced,although like everything theres exploit to get by them!. >REBOOT:is to shut a computer down localy or remotly,trojans like back orrifice and netbus include tools for rebooting a windows user remotly boot,if a hacker or cracker get root on linux he can reboot the system by typing init 6 in his remote command promt. >REDHAT(RH):is a linux distro renound for its easy to use features and its desktop environment. >REG EDIT:is a like a windows control panel except u edit the data in hexadcimal,regedit is a very good tool for changing the way windows works,for e.g with reg edit u could change your data so that your file and printer sharing isnt a valible to remote users e.t.c/e.t.c. >RELATION OPERATOR:a symbol used to compare two or more values in programming. >RELOAD:is used to refresh a web site so that it can stay upto date on the latest news e.t.c >REMAPPING:is used by admins to change their port numbers so hackers think that it an different service. >REMOTE:is a computer which is un a remote location such as in a different city. >REMOTE ADMINISTION:adminstrion a network from a remote location. >REMOTE ATTACK:is when an attacker tries to hack in from an exsternal connection such as the net. >REMOTE COPY(RCP):the unix based uttility that allows you to copy files between 2 computers using syntax that is similar the unix command "cp".it provides a simple syntax to copy files and does not require the user to login proior to initaitng the file copy process. >REMOTE VNC:is a remote control tool which lets windows,unix,mac,and other o/s users to view their desktop from anywhere in the world. >RESEQUENCING:assembling incoming TCP segements so that they are in order in which they were sent. >RESOLVER:under DNS,a client that queries the name server accros a network to gain information on the domain name space. >REVERSE ADDRESS RESOULTION PROOCOL(rarp):a tcp/ip protocol that returns an ip address if given a physical address.This protocol is typically used by diskless workstations that have boot prom installed in their network adapters. >REXEC:a remote command execution uttilty. >RFC(request for comment):are networking papers wrote by computer hackers,admins ,and other smart people,rfc have information on networks,protcol,e.t.c and are known as different numbers such as rfc 1700(port numbers). >RFI(radion frequency interface) >RIP:routing information protocol:a protocol that determins the best path for routing trafic accross a network. >RIP LISTINGING:a process in which a computer listens in on rip packets and adds the info to routing information tables. >RING NETWORK:see token ring: >RLOGIN:a remote login uttiity. >ROOT:is the main user on a unix network who can do anything he wants like change users password,delete data,use every command and so on.Root is also refered to as su(super user),a hacker main objetive is to gain root on his target network.When a cracker or hacker get root on a large web host provider it is possible for him to change every users web page in seconds by uploading an script and executing it to change the data. >ROOT PASSWORD:is the password that a user needs to gain root.Users wanting to gain root localy on a linux box can do so by typing linux 1 in lilo promt then typing "passwd" and entering a new password. >ROOTSHELL:is the main place on the internet for exploits with over 1000 exploits and docmentrentations. >ROUNDING ERROR:a one cent error that occurs when a computer converts decimal numbers into binary code. >ROUTER:a network device which fowarda data by logital address(ip addreses). >ROUTING TABLE:a routing table within the router that relates networks ID's to network paths. >RPM:is a packing manager used on linux o/s for installing new programs from a linux disk. >RSH:A remote command executing utility. >RS-232C(recomended standard 232C:is the standard way for transmitting data accross serial cables and is used for modems as well. >RUNLEVEL:is used on unix for different tasks and booting,runlevel 1-5 is refered to single user and runlevel 6 is reboot,runlevel 0 is shut down:a user can change runlevels by typing "init runlevelnumber" in a unix command promt. >RUPTIME:a unix shell command which shows the users logged on. >SATAN:is a program used to check for known exploits on a system. >SCAN:is used to find computer systems.The most used of type of scanner used is a netbios scanner,a programmer only has to make a few pieces of code for a program to scan ip addresses looking for particular open ports.>also see war dialing. >SCREEN DUMB:is a trojan add on which lets script kiddies take a picture of a remote o/s which has a trojan port open. >SCRIPT:A p//arameterized list of primitive I/O bus operations intended to be executed in sequence. Often used with respect to ports, most of which are able to execute scripts of I/O commands autonomously (without policy processor assistance). A sequence of instructions intended to be parsed and carried out by another program. Perl, VBScript, JavaScript and Tcl are all scripting languages. >SCRIPT KIDDIE:is a person who is usally around 14-30 and they dont really not what hacking is,inexception usally they cant program and they dont know anything on networking but they seem to think disribtuing other crackers viruses and using trojans are hacking,most hackers go through this stage but they grow out it quick. >SEARCH ENGINE:is the newbie hackers best freind as users can search for specific exploits,texts,e/t/c >SECURE BROWSER:is a browser which is complant with SSL encryption which stops sniffers retrieving data. >SECURE HYPERTEXT TRANSFERE PROTOCOL (SHTTP): A security standard for authenticating and encrypting HTTP requests and responses. >SECURITY ZONE:in internet explorer a segement of the internet or intranet assigned a level of security. >SEGMENT:the data package passed from TCP at the transport layer,conection oreneted protocol. >SENDMAIL:is a unix program used for sending mail to its destonation,sendmail runs on port 25 stmp and is considered a buggy program. >SEMANTICSS:The Study of meaning . >SERVER:is a computer which controls a network letting clients connect to it,theres literly thousands of servers,the most popular one are webservers,ftp,telnet and DCHP,A server computer usally the one that the hacker goes for remotly as it has open ports,common server networks included peer to peer an client/server.Webservers and other servers that are up 24/7 usally dont look like pcs but they are a small little box with no mointer,meaning it doesnt get hot as quick as a normal pc. >SERVER MESSAGE BLOCK:the protocol devoped by microsoft,intel and ibm that defies a serious of command used to pass information between network computers. >SERVICE:is refered to an open port or a program designed to let others connect to it,e.g www sites would be called http service,email's would be refered to stmp service or pop servicel. >SESSION:is every time u connect to a server is referred a session.e.g netbios session >SH:is the korn shell on unix and is basically a command environment. >SHARENAME:is the access name given to windows netbios sharing files or drives,share names are the name given to a drive or file,e.g net use p: \\network\docs would acccess the share docs. >SHELL:An interface which makes a program easier to use such as kde for linux instead of using a command shell.>also a shell can be a unix command prompt. >SHELL ACCOUNT:is for non unix users or want to use unix commands but dont have access to unix so the only way for a windows user to get unix is by telnetting to a free or commercial shell account and logging in then he or she can issue unix commands. >SHELL PROGRAMMING:is a scripting language used for issuing shell commands quicker just like a batch file does in dos. >SHTML(server passed hyper text markup language):is a special web page doc which contains commands to make the page do more. >SIGAL TO NOISE:the ammount of informatioon versus idle chatters in a newsgroup posting or email messgage,refers to users who normally post unwanted shit like cracker question in a hacker group or SPAM! >SIGN ON:to call a BBS or dial up to your isp. >SIGNITURE:is commenly used by a user wanting to display a message at the end of their email messgaes or usenet postings. >SINGLE USER:for safetly reason some computers only support single user accounts so when a user is logged in no other user can login. >SLIP(serial line internet protol):a method of hooking by using a high speed modem or standard phone line. >SMALLTALK:one of the first object-orented programming languages in the world. >SMART TERMINAL:a computer connected to a network that can function independently of the network,smart terminals are usally just personal computers with theit own hard disk,disk drive and memory. >SMTP(simple mail transfere protocol):The basic way email messgages are sent through networks> >SNADBOY REVLOLATION TOOL;is a program which can decrypt local *********** passwords on windows. >SNOBOL(string orented symbothic language:is an old programming language designed by bell laboraties. >SOCKET:the network address for a particular application on a particular computer consisting of the computer's ip address followed by the port number of the application. >Softwere:is any type of computer program from an operating system such as windows or a small program such as a virus.without softwere there would be no computer even graphics cards need softwere to make it function properly. >Source:refers to the destination of a packet or in security terms it is used for tracing hackers back to their source.Source can also mean the programming code of a program. >SPA(secure password authentication):any authentication which the password isnt send over a network. >SPAM.is annoying messgages usally advertisements which are sent to newsgroups and email addresses,the hacker culture to spam very seriously and spammers are usally reported to their isp's. >SPEW:a single message posted repeatably to the same newsgroup. >SPOILER:an email or usenet posting which contains information on up coming events such as long awaited movies or programs on computer programs on tv and so on. >SPOILER SPACE:serveral blank lines at the begiining of a messgage in usenet or in emails. >SSL(secure socets layer):a protocol on the internet for sending and recieving information such as credit card details on the internet in such a way which only recepiants can decode the data.Hacking attacks like sniffing fail to work when a site is using SSL because the data is useless to a cracker and the data is un readable.also An industry-standard technique for authenticating and encrypting TCP connections. >STACK:a data structure that programmers use to store and remove data in a last in,first ou(LIFO) order,used essesically in assembly>information isplaced on the stack by using a push command.information is removed by a pop command or a pull command. >STAR:In the shape of a star with a server in the middle and clients connected to it. Fast and is VERY flexable, since terminals can be detached and reatached without breaking the flow of data. Also supports heavy traffic. In a star topology, there is a dedicated Server. >STAR NETWORK:a network configuration in which the central computer has a directline(network cable) connecting every other computer on the network. >STATIC IP:is an ip address which nerver changes but always stays the same,every website and every adsl computer has a static ip address,static ip addreses are considered a security risk for computers with no protection softwere. >STELTH VIRUS:is a sneaky virus that try's to make its self invisable to anti virus programs that will destroy it. >STP <Sheilded Twisted Pair>:A Much thicker type of networking cable than UTP although it is cabable of carrying alot more than the UTP and is about twice as thick. >STRING VARIABLE:a symbol that a program uses to represent a group of charcters. >STRUCTERED PROGRAM:a method of writting programs in small sub programs or modules so that the programs are easy to read and understand,structered programs emphasize that programs can be written using three typs of statements:seqential,loop and condiational.sequencial programs run one after the other,conditioanl statements run are IF-THEN or CASE statements,loop statements are WHILE-DO,DO-WHILE,FOR-DO and REPEAT-UNTILL statements.if u dont know what this means read up on structered programming. >SUB7:one of the most used remote adimistration trojans,script kiddies install the back door by sending the victim sub7 server then entering the victims ip address in his/hers client. >SUBAREA NETWORK:he formal name for hierarchical, mainframe-centric SNA networks. The backbones of these networks are made up of interconnected Type 5 (SNA Hosts) and Type 4 (Communication Controller) subarea nodes. >SUBNET MASK:a 32 bit value that allows the recepiment of ip packets to desguinish the network ID portion of the ip address from the host ID. >SUPPORT:is to do with o/s and protocol and to see if one systems supports login from another type of o/s,windows,unix,linux,and mac e.t.c all support each other as they are based on tcp/ip networking,that means its possible to hack unix from windows or windows from unix e.t.c >SUSE:is another version of linux which has more security than other version like mandrake and winlinux 2000. >SYN:a control flag signifying that sequence number synchroization is taking place,the SYN flag is used at the beginning of a TCP connection as part of the "three way handshake" >SYSEDIT:is a program with windows used for editing autoexec.bat,*.sys,*.bat and any other system files:the program can be started by typing "sysedit" in ms dos >SYSOP:is known as the system operator,it was an old term for the person in charge of a BBS,they are now known as a administrator. >SYSTEM:is the program or o/s which controls a computer,commen systems include apple mac,windows nt,windows 2000,dos,windows ce,unix,vax,linux,iris,amiga e.t.c,The most important thing that an hacker needs to know before hacking a computer is the system its run on . >Systems Network Architecture (SNA)IBM's strategic communications architecture which specifies how SNA hardware and software products communicate and connect with each other. SNA describes the logical structures, formats, protocols and operational procedures for transmitting data through a network, as well as for controlling the network configuration and operation. >SWITCH:A computer capable of routing thousands of connections a second, this used to be done on a switchboard by an operator, but as telephone traffic grew, a faster more complicated system was needed. A Switch is located (usually) at your local CO and this is what you hear when you pick up the phone, then when you dial, you send the correct tones to the Switch and it connects you to the desired phone. >T1:a high speed communication line for internet access,typcially running at speeds of 1.554 megabits per second,mostly isp's,universites and ppl with money have these fast lines. >T3:is an even faster connection line to the net which runs at 45 megabits per second. >TAR:a backup and archiving program used on unix for copying files and clumping togther loads of files together. >TCP/IP(transmission control protocol/internet protocol):is the standard way from transmtting data accross a network or the internet,tcp/ip is so widely used on the net because all operating systems support it,without tcp/ip users cant use the internet,ftp,www,telnet,and irc e.t.c all use tcp because it has error correction in it which stops errors when downloading,e.t.c>also see UDP >TCP connect() scanning : This is the most basic form of TCP scanning. The connect() system call provided by your operating system is used to open a connection to every interesting port on the machine. If the port is listening, connect() will succeed, otherwise the port isn't reachable. One strong advantage to this technique is that you don't need any special privileges. Any user on most UNIX boxes is free to use this call. Another advantage is speed. While making a separate connect() call for every targeted port in a linear fashion would take ages over a slow connection, you can hasten the scan by using many sockets in parallel. Using non-blocking I/O allows you to set a low time-out period and watch all the sockets at once. This is the fastest scanning method supported by nmap, and is available with the -t (TCP) option. The big downside is that this sort of scan is easily detectable and filterable. The target hosts logs will show a bunch of connection and error messages for the services which take the connection and then have it immediately shutdown. >TCPDUMB:is a unix packet sniffer used by admins to moniter their traffic,hackers use it to sniff for passwords,e.t.c >TCP FIN PORT SCANNING : There are times when even SYN scanning isn't clandestine enough. Some firewalls and packet filters watch for SYNs to restricted ports, and programs like synlogger and Courtney are available to detect these scans. FIN packets, on the other hand, may be able to pass through unmolested. This scanning technique was featured in detail by Uriel Maimon in Phrack 49, article 15. The idea is that closed ports tend to reply to your FIN packet with the proper RST. Open ports, on the other hand, tend to ignore the packet in question. As Alan Cox has pointed out, this is required TCP behavior. However, some systems (notably Micro$oft boxes), are broken in this regard. They send RST's regardless of the port state, and thus they aren't vulnerable to this type of scan. It works well on most other systems I've tried. Actually, it is often useful to discriminate between a *NIX and NT box, and this can be used to do that. >TCP REVERSE IDENT PORT SCANNING: As noted by Dave Goldsmith in a 1996 Bugtraq post, the ident protocol (rfc1413) allows for the disclosure of the username of the owner of any process connected via TCP, even if that process didn't initiate the connection. So you can, for example, connect to the http port and then use identd to find out whether the server is running as root. This can only be done with a full TCP connection to the target port >TCP SYN PORT SCANNING: This technique is often referred to as "half-open" scanning, because you don't open a full TCP connection. You send a SYN packet, as if you are going to open a real connection and wait for a response. A SYN|ACK indicates the port is listening. A RST is indicative of a non- listener. If a SYN|ACK is received, you immediately send a RST to tear down the connection (actually the kernel does this for us). The primary advantage to this scanning technique is that fewer sites will log it. >TELEPHONY APPLICATION PROGRAM INTERFACE:(TAPI):a set of calls that allows an application to control modems and telephones by routing functions calls to the appropiate service provider. >TELNET:is a unix or any other o/s service used for remote rogin,telnet provides access to a remote system's command prompt,the telnet serive runs on port 23,although the telnet progam can be used to connect to other ports. >TERMINAL:In hacker terms it could be refered to as a communication program such as hyperterminal but in unix terms it is a command environment,network terminals can be used to provide remote access to systems. >TERMINAL TYPE:used in telnet and other login programs for the setting of the program,common termianl setting are VT100 and echo. >THREE-WAY-HANDSHAKE:a three step procedure that synchronizes seqence numbers and begins a TCP connection. >TOKEN RING NETWORK:A lan type network featuring a ring topolgy and a token passing network method,token ring is an expensive network and usally used in busineses to an alternitive to ethernet. >TOKEN PASSING.the network access layer used by the token ring network. >TOOLS:is the tools which help hackers and admins out like nmap,tcpdumb,queso,john the ripper,telnet,e.t.c >TRACING:is to trace the source ip address of a hacker or cracker,admins usally trace hackers by looking in the log files or by monitering tools,once an admin get the ip address of the attacker(which isnt always the correct one)he will usally query the ip in a whois search then contact the ISP of the person telling them of such activities. >TROJAN HOURSE:a nasty program which hides inside a legitiment program,named after the trojan hourse of troy.Remote adminsration trojan's usally are the biggest threat for users who run windows because if a cracker sendz the victim a file and they execute it the attacker can control there pc remotly and can usally do more than the person in front of it can do. >TRANSPORT LAYER:the layer of the tcp stack that provides error checking and serves as an interface for network applications e.g users who use web brosers like internet explorer go through thhis process when downloading files. >TRON:a basic programming language command thats's conjuction with trace and ON.the tron command enables programmers to examine a program as it runs. >TRUST-BASED SECURITY:a cross platform security model thats adds intermidate levls of trust to the java security model. >TTL(time to live):used in network commands such as ping and traceroute,tracert.TTL is usally around 255 m sec's. >TUTORIALS:are free documents on the web which guide newbies through hacking,networking,programming,how to do,e.t.c. >TWISTED PAIR:a set of networking cables which dont need a port to connect them to a network. >UDP(user datagram protocol:is a network protocol which runs much faster than tcp/ip alghough it has no error checking,its is a connectionlees protocol >URL(uniform resource locator):is a command which contacts veroius internet sites like http:// for the world wibe web,gopher:// for gopher,mailito: for email,telnet:// for telnet,ftp:// for file transfere protocl,e.t.c >UNIX:An o/s devloped by bells labs in the last 1960's refines in the 70's and 80's,written in c(which was devloped by bells labs as well).UNIX is a maultiuser o/s usally used on networks and personal computers in universities.Unix will work on any o/s because its written in c,unix is a command based o/s like ms dos but more cruder and powerfull.Unix has severall graphicals user interfaces for it including xwindows,and open lock,unix is used by hackers because it supports all the major programming languages and because it has far no network cappabuilities. >UPLOAD:to transfere a file from a computer and put it on another computer,crackers are known to upload viruses to hacked systems. >UPTIME:is a interesting command for windows telnet users and unix users,uptime shows how long the computer has been up for and also it shows all the users logged in. >USENET(user net):is a internet factillity which offers a virety of newsgroups,bullitin boards,and pulic forums. >USER:ON unix accounts user is a user account which has restricted access., >USER ID:is a valid user account name on a system. >USER NAME:SAME AS USER ID >UUCP(unix to unix copy program):a wide internation of wide area networks of all sorts of unix computers,uucp is used to copy data from one computer to another,which means the service is under threat from hackers. >VANDALS:are internet crackers who like to destroy data and distrubute viruses across the net,crackers like to build websites using activex and java so that they can cause havock on the inosent victim;s computer who visits the site. >VARIBLE:in programming,a symbol that represents a number value or a string of text in a program.Using varibles gives programmers the fredom to change to change the value at any point in the program. >VAX:a line of computers produced by digital equipment corp.VAX is another o/s similar to unix and is widely used in banks and hospitals,because of that wardialing is the scan attack the hacker uses on vax. >VBX(visal basic extension):are an addon code for a vb program. >VIRTUAL PRIVATE NETWORK(VPN): technology which one can securly connect to a remote server by tunneling through a network. >VIRUS:a virus is a desructive program which usally affects windows users,chaging the bios settings,deleting data,spreading its self although the correct term is called worm,viruses are made by usally 14-22 year olds wanting to prove that they can program,most viruses are written in visual basic,assembly and c,most of the common day viruses are clones from the old ones with the code slighty modified. >VISUAL BASIC(vb):a microsoft version of the basic language with a user interface that lets your draw your graphical interface then u can write in BASIC commands to make the program work,VB is commenly used for macro's in MS Word and other microsoft packages.,VIsual basic is so commently used because it is much easier to learn that c,c++,pascall and in VB programs can get made quickers,VB is considered Lame amongt the hacker community because the concepts of VB teach users bad habbits in programming. >WAIS(wide area information server):a server used for making searching the web easier. >WAP(wireless application protocool):is a scripting lanuage used for making websites that WAP mobile phones can view.Recently their been WAP viruses released by crackers which record users phone calls. >WAREZ:known as the internet pirates,warez dudes are another part of the underground who like to crack softwere trials and copy illigal softwere. >WARDIALER:also known as a demon dialer,a modem program which dials from say 555-0000 on up through 555-9999,finding computers with modem support.this is way a hacker would find an phone support o/s in his area. >WARFTP:is the most popular ftp server for home users. >WARGAMES:A 1983 film staring mathew broderick who is a teenage hacker who gains access to mility computers,wargames concentrates on dial up hacking,wardialing e.t.c >WEB:the nick name for world wibe web. >WEB SERVER:a computer or softwere program thats runs on a computer and answers request for web pages on the world wibe web,the most common web server are lotus domino,apache,and microsoft IIS. >WEB SPACE:a computer that stores users files and gives the rest of the world acces to them as a web site.t >WEBCRAWLER:a a robot designed for searching the world wide web,webcrawlers displas its result based on how many web pages contain similar words to those u are searching for. >WIDE AREA NETWORK(WAN):a network of computers that spans a large distance,as opposed to a local rea network which invloves computers on the same building. >WINDOWS CE:is a small version of windows designed for pamtop computers,also dreamcast based on windows CE. >WINDOWS 3.1:was one of the first graphical user interfaces built by Microsoft,windows 3.1 is has very insecure password protection and is 90 per sent built on dos. >WINDOWS 95/98/ME:are recent windows o/s desgined mostly for powerfull game play,and to make computers easier. WINDOWS NT/2000:are the most expensive windows o/s mostly used for busineses with networks,windows 2000 has a lot of features of windows 98 and is built with more networking features of windows NT. >WINDOWS FOR WORKGROUPS:a special feature with windows desinged for usage with LAN's >WINGATES:is a proxy server which hides a computer ip address making the wingates server's ipaddress look like the computer ip adddress,wingates is used on the internet and when using network services like netbios,e.t.c. >WINS(windows internet naming service):a wins server is a microsoft implemention of a netbios name server. >WINSTOCK:a windows programming interface that provides access to TCP and UDP ports. >XWINDOW:a graphical based user interface often associated with unix. >YAHOO:is a web directroy search engine which has auctions,chat,mail,e.t.c,also yahoo has currently one of the largest search engines in the world. >ZOMBIE:is a programming script which is usally uploaded to hacked computers,zombies mainly used by crackers are used for nuking users,hacking and doing other hacking/cracking techniques,zombies can be used to nuke ip addreses from a hacked computer meaning the hacked computer gets traced.
These are commenly used irc codes or acronymn for emails'irc and internet guide. AAMOF = As A Matter Of Fact BAC = By Any Chance C = See DIIK = Damned If I Know F = Female <G> = Grin H/A = Hi All IAC = In Any Case J\K = Just Kidding K = OK <L> = Laugh M = Male ODAT = One Day At a Time PPL = People QL = Cool V = Victory WAW = Why Ask Why? XP = Experience (as in my experience) Y = Why? YABA = Yet Another Bloody Acronym Z = Sleeping or Bored (obvious zzzZZZZ)
2 = To, Too or Two
BASIC IRC COMMANDS /ADMIN
/AWAY without any additional argument will remove the away-message. /BAN <#channel> <nick[!user@host]> <maskmode> /FINGER <user@host>
/KICK <#channel> <nick> <your comment> /LEAVE <#channel>
Change your nickname.
/QUERY <nick> /QUIT <your farewell message>
additional commands to learn Type /HELP <command> for more information, or /HELP -l User defined commands: ACTION ALIAS BANLIST CHAT DIALOG one other thing to note is unix and windows irc commands are slightly IRC DICTIOANRY note:for more addional words see the main hacker dictioanry.
Aliases - Aliases are short macros written within your IRC client application to create shortcuts, run scripts or issue IRC commands simply. Bots - A bot (short for robot) is an IRC user that is not a user at all, but is a collection of scripted IRC commands running as a program within the IRC client program. It only responds to things done to it, or things that it is programmed to do. There are a few bots that serve purposes. These bots are usually game related. It is considered good IRC etiquette to include the word "BOT" in the bot's nickname if you are running one on a channel. Bots are generallyconsidered a nuisance on IRC and using one on most IRC servers will get you "k-lined". If there are bots taking up 10 connections, that is 10 less real people that can be online, and IRC =is= a place for chatting after all. ChanOp - Operator of the Channel, usually has a @before their name Clones - A clone is someone logged on to your channel more than once.
I've seen people refer to these as "ghosts" here on DM. Not
the same Flooding - Flooding can be anything that disrupts the channel or even trashes an individuals computer...examples being gargantuan text files sent to the channel, DCC SENDS of god-knows-what to individuals, repeated and intensive /msg sends, etc. A very good idea to enable Flood Protection in your IRC client application & disable automated DCC/CTCP receives. Ghost - A ghost (or ghosting) occurs when you quit a channel abruptly
and log back in immediately. Many times your former log-in will still
exist IRC - IRC is an acronym for Internet Relay Chat..proper usage is "I'm IRC-ing" as opposed to "I am IRC Chatting" <G> IRC Client - This refers to the particular software or method that the user (such as you) runs to connect to a server on one of the IRC nets. For instance, if you use mIRC to access IRC, that is your IRC client...others would be Comic Chat, IRCle, pIRCh, etc. IRCop - Operator of the IRC. This is not a "COP", but they do keep an eye out for weirdness on the IRC server. K-Lined - If you are K-lined, it simply means that a server is set to
Lags - A lag is the time in seconds that it takes the text you just entered
to reach the screen of the person you are talking to. A lag of a second
or
two is not too bad, but anything over 10 seconds is considered a bad lag.
You
can check lag by /ping-ing the other client. Lag can be caused by a variety
of
factors, including: a noisy phone line, trouble with your ISP, trouble
with
your IRC client, trouble with the IRC server, trying to do other things
while
on IRC (ftp-ing, web browsing, etc.), overcrowded channel. In order to
acheive 'Leet - 'Leet equals "elite", usually used to refer to a well-written script, program or bot. LYB - Ask Shannon about this one! LOL!!! Netsplit - Netsplits are a major cause of lag. A netsplit happens
when a server in your connection loses contact with the rest of the servers.
You can see a Netsplit occurring if you notice people on your "notify
list"
signing on & off manytimes during your session -- or if members of
your
channel suddenly quit in a way that resembles: "Signoff:nick1 Scripts - Scripts are small programs designed to run within an IRC client, usually using the client's built in scripting language. WareZ - Channels with "warez" "appz" "krackz" and "hackz" (or any variation thereof are IRC channels (highly illegal and punishable by death if seen on DM) that distribute pirated copies of software. Warez channels move around a lot. Since they are illegal they are viewed by many IRC users as good targets for flooding, channel takeovers & general warfare.
0/tcp Reserved 0/udp Reserved tcpmux 1/tcp TCP Port Service Multiplexer tcpmux 1/udp TCP Port Service Multiplexer compressnet 2/tcp Management Utility compressnet 2/udp Management Utility compressnet 3/tcp Compression Process compressnet 3/udp Compression Process rje 5/tcp Remote Job Entry rje 5/udp Remote Job Entry echo 7/tcp Echo echo 7/udp Echo discard 9/tcp Discard discard 9/udp Discard systat 11/tcp Active Users systat 11/udp Active Users daytime 13/tcp Daytime (RFC 867) daytime 13/udp Daytime (RFC 867) qotd 17/tcp Quote of the Day qotd 17/udp Quote of the Day msp 18/tcp Message Send Protocol msp 18/udp Message Send Protocol chargen 19/tcp Character Generator chargen 19/udp Character Generator ftp-data 20/tcp File Transfer [Default Data] ftp-data 20/udp File Transfer [Default Data] ftp 21/tcp File Transfer [Control] ftp 21/udp File Transfer [Control] ssh 22/tcp SSH Remote Login Protocol ssh 22/udp SSH Remote Login Protocol telnet 23/tcp Telnet telnet 23/udp Telnet smtp 25/tcp Simple Mail Transfer smtp 25/udp Simple Mail Transfer nsw-fe 27/tcp NSW User System FE nsw-fe 27/udp NSW User System FE msg-icp 29/tcp MSG ICP msg-icp 29/udp MSG ICP msg-auth 31/tcp MSG Authentication msg-auth 31/udp MSG Authentication dsp 33/tcp Display Support Protocol dsp 33/udp Display Support Protocol time 37/tcp Time time 37/udp Time rap 38/tcp Route Access Protocol rap 38/udp Route Access Protocol rlp 39/tcp Resource Location Protocol rlp 39/udp Resource Location Protocol graphics 41/tcp Graphics graphics 41/udp Graphics name 42/tcp Host Name Server name 42/udp Host Name Server nameserver 42/tcp Host Name Server nameserver 42/udp Host Name Server nicname 43/tcp Who Is nicname 43/udp Who Is mpm-flags 44/tcp MPM FLAGS Protocol mpm-flags 44/udp MPM FLAGS Protocol mpm 45/tcp Message Processing Module [recv] mpm 45/udp Message Processing Module [recv] mpm-snd 46/tcp MPM [default send] mpm-snd 46/udp MPM [default send] ni-ftp 47/tcp NI FTP ni-ftp 47/udp NI FTP auditd 48/tcp Digital Audit Daemon auditd 48/udp Digital Audit Daemon tacacs 49/tcp Login Host Protocol (TACACS) tacacs 49/udp Login Host Protocol (TACACS) re-mail-ck 50/tcp Remote Mail Checking Protocol re-mail-ck 50/udp Remote Mail Checking Protocol la-maint 51/tcp IMP Logical Address Maintenance la-maint 51/udp IMP Logical Address Maintenance xns-time 52/tcp XNS Time Protocol xns-time 52/udp XNS Time Protocol domain 53/tcp Domain Name Server domain 53/udp Domain Name Server xns-ch 54/tcp XNS Clearinghouse xns-ch 54/udp XNS Clearinghouse isi-gl 55/tcp ISI Graphics Language isi-gl 55/udp ISI Graphics Language xns-auth 56/tcp XNS Authentication xns-auth 56/udp XNS Authentication xns-mail 58/tcp XNS Mail xns-mail 58/udp XNS Mail 59/tcp any private file service 59/udp any private file service ni-mail 61/tcp NI MAIL ni-mail 61/udp NI MAIL acas 62/tcp ACA Services acas 62/udp ACA Services whois++ 63/tcp whois++ whois++ 63/udp whois++ covia 64/tcp Communications Integrator (CI) covia 64/udp Communications Integrator (CI) tacacs-ds 65/tcp TACACS-Database Service tacacs-ds 65/udp TACACS-Database Service sql*net 66/tcp Oracle SQL*NET sql*net 66/udp Oracle SQL*NET bootps 67/tcp Bootstrap Protocol Server bootps 67/udp Bootstrap Protocol Server bootpc 68/tcp Bootstrap Protocol Client bootpc 68/udp Bootstrap Protocol Client tftp 69/tcp Trivial File Transfer tftp 69/udp Trivial File Transfer gopher 70/tcp Gopher gopher 70/udp Gopher netrjs-1 71/tcp Remote Job Service netrjs-1 71/udp Remote Job Service netrjs-2 72/tcp Remote Job Service netrjs-2 72/udp Remote Job Service netrjs-3 73/tcp Remote Job Service netrjs-3 73/udp Remote Job Service netrjs-4 74/tcp Remote Job Service netrjs-4 74/udp Remote Job Service 75/tcp any private dial out service 75/udp any private dial out service deos 76/tcp Distributed External Object Store deos 76/udp Distributed External Object Store vettcp 78/tcp vettcp vettcp 78/udp vettcp finger 79/tcp Finger finger 79/udp Finger http 80/tcp World Wide Web HTTP http 80/udp World Wide Web HTTP www 80/tcp World Wide Web HTTP www 80/udp World Wide Web HTTP www-http 80/tcp World Wide Web HTTP www-http 80/udp World Wide Web HTTP hosts2-ns 81/tcp HOSTS2 Name Server hosts2-ns 81/udp HOSTS2 Name Server xfer 82/tcp XFER Utility xfer 82/udp XFER Utility mit-ml-dev 83/tcp MIT ML Device mit-ml-dev 83/udp MIT ML Device ctf 84/tcp Common Trace Facility ctf 84/udp Common Trace Facility mit-ml-dev 85/tcp MIT ML Device mit-ml-dev 85/udp MIT ML Device mfcobol 86/tcp Micro Focus Cobol mfcobol 86/udp Micro Focus Cobol kerberos 88/tcp Kerberos kerberos 88/udp Kerberos su-mit-tg 89/tcp SU/MIT Telnet Gateway su-mit-tg 89/udp SU/MIT Telnet Gateway dnsix 90/tcp DNSIX Securit Attribute Token Map dnsix 90/udp DNSIX Securit Attribute Token Map mit-dov 91/tcp MIT Dover Spooler mit-dov 91/udp MIT Dover Spooler npp 92/tcp Network Printing Protocol npp 92/udp Network Printing Protocol dcp 93/tcp Device Control Protocol dcp 93/udp Device Control Protocol objcall 94/tcp Tivoli Object Dispatcher objcall 94/udp Tivoli Object Dispatcher supdup 95/tcp SUPDUP supdup 95/udp SUPDUP dixie 96/tcp DIXIE Protocol Specification dixie 96/udp DIXIE Protocol Specification swift-rvf 97/tcp Swift Remote Virtural File Protocol swift-rvf 97/udp Swift Remote Virtural File Protocol tacnews 98/tcp TAC News tacnews 98/udp TAC News metagram 99/tcp Metagram Relay metagram 99/udp Metagram Relay newacct 100/tcp [unauthorized use] hostname 101/tcp NIC Host Name Server hostname 101/udp NIC Host Name Server iso-tsap 102/tcp ISO-TSAP Class 0 iso-tsap 102/udp ISO-TSAP Class 0 gppitnp 103/tcp Genesis Point-to-Point Trans Net gppitnp 103/udp Genesis Point-to-Point Trans Net acr-nema 104/tcp ACR-NEMA Digital Imag. & Comm. 300 acr-nema 104/udp ACR-NEMA Digital Imag. & Comm. 300 cso 105/tcp CCSO name server protocol cso 105/udp CCSO name server protocol csnet-ns 105/tcp Mailbox Name Nameserver csnet-ns 105/udp Mailbox Name Nameserver 3com-tsmux 106/tcp 3COM-TSMUX 3com-tsmux 106/udp 3COM-TSMUX rtelnet 107/tcp Remote Telnet Service rtelnet 107/udp Remote Telnet Service snagas 108/tcp SNA Gateway Access Server snagas 108/udp SNA Gateway Access Server pop2 109/tcp Post Office Protocol - Version 2 pop2 109/udp Post Office Protocol - Version 2 pop3 110/tcp Post Office Protocol - Version 3 pop3 110/udp Post Office Protocol - Version 3 sunrpc 111/tcp SUN Remote Procedure Call sunrpc 111/udp SUN Remote Procedure Call mcidas 112/tcp McIDAS Data Transmission Protocol mcidas 112/udp McIDAS Data Transmission Protocol ident 113/tcp auth 113/tcp Authentication Service auth 113/udp Authentication Service audionews 114/tcp Audio News Multicast audionews 114/udp Audio News Multicast sftp 115/tcp Simple File Transfer Protocol sftp 115/udp Simple File Transfer Protocol ansanotify 116/tcp ANSA REX Notify ansanotify 116/udp ANSA REX Notify uucp-path 117/tcp UUCP Path Service uucp-path 117/udp UUCP Path Service sqlserv 118/tcp SQL Services sqlserv 118/udp SQL Services nntp 119/tcp Network News Transfer Protocol nntp 119/udp Network News Transfer Protocol cfdptkt 120/tcp CFDPTKT cfdptkt 120/udp CFDPTKT erpc 121/tcp Encore Expedited Remote Pro.Call erpc 121/udp Encore Expedited Remote Pro.Call smakynet 122/tcp SMAKYNET smakynet 122/udp SMAKYNET ntp 123/tcp Network Time Protocol ntp 123/udp Network Time Protocol ansatrader 124/tcp ANSA REX Trader ansatrader 124/udp ANSA REX Trader locus-map 125/tcp Locus PC-Interface Net Map Ser locus-map 125/udp Locus PC-Interface Net Map Ser unitary 126/tcp Unisys Unitary Login unitary 126/udp Unisys Unitary Login locus-con 127/tcp Locus PC-Interface Conn Server locus-con 127/udp Locus PC-Interface Conn Server gss-xlicen 128/tcp GSS X License Verification gss-xlicen 128/udp GSS X License Verification pwdgen 129/tcp Password Generator Protocol pwdgen 129/udp Password Generator Protocol cisco-fna 130/tcp cisco FNATIVE cisco-fna 130/udp cisco FNATIVE cisco-tna 131/tcp cisco TNATIVE cisco-tna 131/udp cisco TNATIVE cisco-sys 132/tcp cisco SYSMAINT cisco-sys 132/udp cisco SYSMAINT statsrv 133/tcp Statistics Service statsrv 133/udp Statistics Service ingres-net 134/tcp INGRES-NET Service ingres-net 134/udp INGRES-NET Service epmap 135/tcp DCE endpoint resolution epmap 135/udp DCE endpoint resolution profile 136/tcp PROFILE Naming System profile 136/udp PROFILE Naming System netbios-ns 137/tcp NETBIOS Name Service netbios-ns 137/udp NETBIOS Name Service netbios-dgm 138/tcp NETBIOS Datagram Service netbios-dgm 138/udp NETBIOS Datagram Service netbios-ssn 139/tcp NETBIOS Session Service netbios-ssn 139/udp NETBIOS Session Service emfis-data 140/tcp EMFIS Data Service emfis-data 140/udp EMFIS Data Service emfis-cntl 141/tcp EMFIS Control Service emfis-cntl 141/udp EMFIS Control Service bl-idm 142/tcp Britton-Lee IDM bl-idm 142/udp Britton-Lee IDM imap 143/tcp Internet Message Access Protocol imap 143/udp Internet Message Access Protocol uma 144/tcp Universal Management Architecture uma 144/udp Universal Management Architecture uaac 145/tcp UAAC Protocol uaac 145/udp UAAC Protocol iso-tp0 146/tcp ISO-IP0 iso-tp0 146/udp ISO-IP0 iso-ip 147/tcp ISO-IP iso-ip 147/udp ISO-IP jargon 148/tcp Jargon jargon 148/udp Jargon aed-512 149/tcp AED 512 Emulation Service aed-512 149/udp AED 512 Emulation Service sql-net 150/tcp SQL-NET sql-net 150/udp SQL-NET hems 151/tcp HEMS hems 151/udp HEMS bftp 152/tcp Background File Transfer Program bftp 152/udp Background File Transfer Program sgmp 153/tcp SGMP sgmp 153/udp SGMP netsc-prod 154/tcp NETSC netsc-prod 154/udp NETSC netsc-dev 155/tcp NETSC netsc-dev 155/udp NETSC sqlsrv 156/tcp SQL Service sqlsrv 156/udp SQL Service knet-cmp 157/tcp KNET/VM Command/Message Protocol knet-cmp 157/udp KNET/VM Command/Message Protocol pcmail-srv 158/tcp PCMail Server pcmail-srv 158/udp PCMail Server nss-routing 159/tcp NSS-Routing nss-routing 159/udp NSS-Routing sgmp-traps 160/tcp SGMP-TRAPS sgmp-traps 160/udp SGMP-TRAPS snmp 161/tcp SNMP snmp 161/udp SNMP snmptrap 162/tcp SNMPTRAP snmptrap 162/udp SNMPTRAP cmip-man 163/tcp CMIP/TCP Manager cmip-man 163/udp CMIP/TCP Manager cmip-agent 164/tcp CMIP/TCP Agent smip-agent 164/udp CMIP/TCP Agent xns-courier 165/tcp Xerox xns-courier 165/udp Xerox s-net 166/tcp Sirius Systems s-net 166/udp Sirius Systems namp 167/tcp NAMP namp 167/udp NAMP rsvd 168/tcp RSVD rsvd 168/udp RSVD send 169/tcp SEND send 169/udp SEND print-srv 170/tcp Network PostScript print-srv 170/udp Network PostScript multiplex 171/tcp Network Innovations Multiplex multiplex 171/udp Network Innovations Multiplex cl/1 172/tcp Network Innovations CL/1 cl/1 172/udp Network Innovations CL/1 xyplex-mux 173/tcp Xyplex xyplex-mux 173/udp Xyplex mailq 174/tcp MAILQ mailq 174/udp MAILQ vmnet 175/tcp VMNET vmnet 175/udp VMNET genrad-mux 176/tcp GENRAD-MUX genrad-mux 176/udp GENRAD-MUX xdmcp 177/tcp X Display Manager Control Protocol xdmcp 177/udp X Display Manager Control Protocol nextstep 178/tcp NextStep Window Server nextstep 178/udp NextStep Window Server bgp 179/tcp Border Gateway Protocol bgp 179/udp Border Gateway Protocol ris 180/tcp Intergraph ris 180/udp Intergraph unify 181/tcp Unify unify 181/udp Unify audit 182/tcp Unisys Audit SITP audit 182/udp Unisys Audit SITP ocbinder 183/udp OCBinder ocserver 184/tcp OCServer ocserver 184/udp OCServer remote-kis 185/tcp Remote-KIS remote-kis 185/udp Remote-KIS kis 186/tcp KIS Protocol kis 186/udp KIS Protocol aci 187/tcp Application Communication Interface aci 187/udp Application Communication Interface mumps 188/tcp Plus Five's MUMPS mumps 188/udp Plus Five's MUMPS qft 189/tcp Queued File Transport qft 189/udp Queued File Transport gacp 190/tcp Gateway Access Control Protocol gacp 190/udp Gateway Access Control Protocol prospero 191/tcp Prospero Directory Service prospero 191/udp Prospero Directory Service osu-nms 192/tcp OSU Network Monitoring System osu-nms 192/udp OSU Network Monitoring System srmp 193/tcp Spider Remote Monitoring Protocol srmp 193/udp Spider Remote Monitoring Protocol irc 194/tcp Internet Relay Chat Protocol irc 194/udp Internet Relay Chat Protocol dn6-nlm-aud 195/tcp DNSIX Network Level Module Audit dn6-nlm-aud 195/udp DNSIX Network Level Module Audit dn6-smm-red 196/tcp DNSIX Session Mgt Module Audit Redir dn6-smm-red 196/udp DNSIX Session Mgt Module Audit Redir dls 197/tcp Directory Location Service dls 197/udp Directory Location Service dls-mon 198/tcp Directory Location Service Monitor dls-mon 198/udp Directory Location Service Monitor smux 199/tcp SMUX smux 199/udp SMUX src 200/tcp IBM System Resource Controller src 200/udp IBM System Resource Controller at-rtmp 201/tcp AppleTalk Routing Maintenance at-rtmp 2 TROJAN PORTS port 21 - Back Construction, Blade Runner, Doly Trojan, Fore, FTP trojan,
Invisible FTP, Larva,
A A3D Aureal 3D surround sound technology. AA Anti-Aliasing edge smoothing technology (3D video). AAAS American Association for the Advancement of Science. AAF Advanced Authoring format (Microsoft video). AC Alternating Current. AC-3 Dolby Digital 5.1 Surround Sound standard (5 + 1 = 6 channels). ACPI Advanced Configuration Power Interface. ADC Analog to Digital Converter. ADPCM Adaptive Differential Pulse Code Modulation. ADSL Asymmetrical Digital Subscriber Line modem. AFM Atomic Force Microscope. AFR Alternate Frame Rendering (ATI Rage Fury MAXX). AGP Accelerated Graphics Port technology standard (Intel). AGP-1x Accelerated Graphics Port technology 1st generation standard: 66 MB/sec bandwidth (Intel). AGP-2x Accelerated Graphics Port technology 2nd generation standard using sidebands: 133 MB/sec bandwidth (Intel). AGP-4x Accelerated Graphics Port technology 3nd generation standard using fast writes: 266 MB/sec bandwidth (Intel). AGRAS AntiGlare AntiReflection AntiStatic screen treatment (CRT). AI Artificial Intelligence. AIFF Audio Interchange File Format (Apple). AIT Advanced Intelligent Tape (Sony). ALDC Adaptive Lossless Data Compression (IBM). AMD Advanced Micro Devices Incorporated. AMI American Megatrends Incorporated. ANI Microsoft Windows ANImated cursor graphic file. ANSI American National Standards Institute. AOL America OnLine Incorporated - a public Online Service Provider. API Application Programming Interface. APIC Advanced Programmable Interrupt Controler. APM Advanced Power Management. ARAG AntiReflection AntiGlare screen treatment (CRT). ARAS AntiReflection AntiStatic screen treatment (CRT). ARP Address Resolution Protocol. ARPAnet The ancestor of the internet, created in 1969 by the US Department of Defence. Standing for Advanced Research Projects Asscosiation NETwork ASC Active Signal Correction technology (Sony CRT). ASCII American Standard Code for Information Interchange. ASF Advanced Streaming Format (Microsoft NetShow). ASIC Application Specific Integrated Circuit. ASP (1) Advanced Sound Processor (Creative Labs). ASP (2) Application Service Provider. ASPI Advanced SCSI Programming Interface. ASVD Analog Simultaneous Voice and Data. Async SRAM Asynchronous Static Random Access Memory (CPU L2 cache). AT Advanced Technology (Intel motherboard form factor). ATA Advanced Technology Attachment (ANSI standard for Integrated DriveElectronics). ATA-4 Ultra ATA/Ultra DMA 33.3 MB/second tranfer rate (EIDE/ATA hard drive standard). ATA-6 Ultra ATA/Ultra DMA 66.6 MB/second tranfer rate (EIDE/ATA hard drive standard). ATAPI Advanced Technology Attachment Packet Interface. Athlon AMD Athlon K7 CPU. ATM (1) Adobe Type Manager. ATM (2) Asynchronous Transfer Mode (network). ATSC Advanced Television Systems Committee. ATV Advanced TeleVision (i.e. HDTV). ATX Advanced Technology EXtended (Intel motherboard form factor). AUTOEXEC.BAT AUTOmatically EXECuted BATch file. AVI Advanced Video Interleave (Microsoft video). AWR Active Wide Range playback system (Toshiba CD-ROM). AXCEL216 Packard Bell AXCEL216 386/SX 25 MHz (my first PC). B b (1) bit (binary digit): unit of information: 0 or 1. B (2) Byte (1 Byte, 8 bits). BASIC Beginners All purpose Symbolic Instruction Code. BAT MS-DOS ASCII BATch program file. Baud Modem line (carrier) signaling high/low shifts/events per second. BBS Bulletin Board System. A system that allows you to read other people's messages and post new ones. BDA BIOS Data Area. BEDO Burst Extended Data Out (DRAM). BGA Ball Grid Array (242 pin Intel CPU). BIF Binary Image Format file. BIOS Basic Input/Output System. bit The smallest measure for computer data. Eight bits make up a byte. One byte equals one character. BMP RGB/RLE encoded Microsoft Windows BitMap Picture file. bpp bits per pixel. Bps Bytes per second. bps bits per second. BSB Back Side Bus (motherboard CPU to RAM bus). BSOD Blue Screen Of Death [Microsoft Windows most dreaded "feature" :)]. bus Binary data gateway between hardware modules: CPU, RAM, I/O etc. byte Series of bits, usually eight in length. Bytes are used to describe computer storage. C CAB CABinet compression format standard (Microsoft). CAD Computer Aided Design. CADD Computer Aided Design and Drafting. CAS Column Access Strobe. CAV Constant Angular Velocity (compact disc). CCITT Commité Consultatif International du Télégraphe et Téléphonie (International Telegraph and Telephony Consultative Committee). CD Compact Disk. CD-DA Compact Disk Digital Audio. CDFS CD-ROM File System (data CD). CD-I Compact Disc Interactive. CDR CorelDRAW! image file. CDRAM Cache Dynamic Random Access Memory. CD-R Compact Disk Recorder. CD-RAM Compact Disk Rewritable Access Media. CD-ROM Compact Disk Read Only Media. CD-ROM/XA Compact Disk Read Only Media EXtended Architecture (Sony, Philips, Microsoft). CD-RW Compact Disk ReWritable. CDSL Consumer Digital Subscriber Line modem (Rockwell). Celeron Intel Pentium II/III Celeron CPU (80686). CERT Computer Emergency Response Team. CGA Color Graphics Adapter. CGI (1) Computer Generated Image. CGI (2) Common Gateway Interface. CGM Computer Graphics Metafile. CHAP Challenge Handshake Authentication Protocol. CHS Cylinder/Head/Sector. CIAC Computer Incident Advisory Capability team. CISC Complex Instruction Set Computing (CPU). CIX The Commercial Internet Exchange. An association of Internet providers which agrees to exchange traffic. CL Creative Labs Limited. CLP Microsoft Windows CLiPboard Bitmap file. CLV Constant Linear Velocity (compact disk). CMOS Complementary Metal Oxide Semiconductor manufacturing process. CMOS 7S CMOS 7S manufacturing process (IBM). CMOS-SOS CMOS Silicon On Sapphire manufacturing process. CMP Chip MultiProcessing (more than 1 CPU per chip). CMS ColorSync Color Management System (Apple). COBOL COmmon Business Oriented Language. CODEC Digital video COmpressor and DECompressor (Intel Indeo). com When this appears at the end of an address (e.g. john.doe@acme.com) it means the organisation for which Mr Doe works is a company, rather than an educational establishment or government agency. COM (1) Serial COMmunication Port. COM (2) Component Object Model (Microsoft). CON CONsole (display). CONFIG.SYS CONFIGuration SYStem file. country code The last part of an e-mail address (or domain name) indicating where the host computer is based. (eg .uk is United Kingdom) cps characters per second. CPU Central Processing Unit (processor). CRC Cyclical Redundancy Check. CRT Cathode Ray Tube. CS CompuServe. CSLIP Compressed Serial Line Internet Protocol. CSS Cascading Style Sheets HTML specifications (W3C). CSS1 Cascading Style Sheets mechanism level 1 (W3C). CSS2 Cascading Style Sheets mechanism level 2 (W3C). CUR Microsoft Windows static CURsor graphic file. CUT Dr. Halo picture file. D D3D DirectX 3D APIs (Microsoft Windows 9x/2000/Millennium). DAC Digital to Analog Converter. DAT Digital Audio Tape. dB deciBel (10 dB = 1 Bel). DBS Digital Broadcasting System. DC Direct Current. DCE Data Communications Equipment (modem to modem speed). DDC Display Data Channel. DDE Dynamic Data Exchange. DDMA Distributed Direct Memory Access standard. DDR-SDRAM Double Data Rate Synchronous Dynamic Random Access Memory. DDSS Dolby Digital AC-3 5.1 Surround Sound standard (5 + 1 = 6 channels). DEK Data Encryption Key. DES Data Encryption Standard. DHCP Dynamic Host Configuration Protocol. DHTML Dynamic HyperText Markup Language (W3C). DIB (1) RGB/RLE encoded Microsoft Windows Device Independent Bitmap. DIB (2) Dual Independent Bus architecture (Intel Pentium Pro and Pentium II/III). DIG Digital Imaging Group. DIMM Dual In-line Memory Module. DIN Deutsches Institut für Normung (German Institute for Standards). DIP Dual In-line Package. DIVX DIgital Video eXpress (discontinued DVD standard). DLC Data Link Control protocol. DLL Dynamic Link Library. DLP Digital Light Processing technology. DLS DownLoadable Sounds standard (PCI MIDI). DMA Direct Memory Access. DME Direct Memory Execution (Intel I-740). DMF Distribution Media Format: high density floppy disk (Microsoft). DMI Desktop Management Interface. DMTF Desktop Management Task Force. DNA Distributed interNet Applications architecture (Windows 98). DNS Domain Name Server. A computer on the Internet which turns the people-friendly Internet domain names into the numerical IP addresses that computer use. DOCSIS ITU J.112 Data Over Cable Service Interface Specification. DOF Depth Of Field (3D video). DOM Document Object Model standard (W3C). DOS Disk Operating System. DPI Dots Per Inch. DPLSS Dolby Pro Logic Surround Sound standard (5 channels). DPMA Dynamic Power Management Architecture (Intel PCI/AGP chipsets). DPMI DOS Protected Mode Interface. DPMS VESA Display Power Management Signaling standard. DRAM Dynamic Random Access Memory. DR-DOS Caldera Digital Research Disk Operating System. Drive-TIP Drive Temperature Indicator Processor (IBM hard drive). DRP Distribution and Replication Protocol. DRW Micrografx DRaW image file. DS3D DirectXSound 3D APIs (Microsoft Windows 9x/2000/Millennium). DSC Digital Servo Control (Toshiba CD-ROM). DS/DD Double-Sided Double-Density (floppy disk standard: 720 KB). DS/HD Double-Sided High-Density (floppy disk standard: 1.44 MB). DSL Digital Subscriber Line modem. DSP (1) Digital Signal Processor. DSP (2) Delivery Service Partner (OEM). DSS (1) Digital Satellite System. DSS (2) Digital Signature Standard certificate. DSVD Digital Simultaneous Voice and Data. DTD Document Type Definition. DTE Data Terminal Equipment (modem to computer speed). DTP DeskTop Publishing. DTR Data Transfer Rate (throughput). DTV (1) DeskTop Video. DTV (2) Digital TeleVision. DUN Dial-Up Networking (Microsoft Windows 95/98). DVD Digital Versatile (Video) Disc. DVD-2 Second generation DVD drive. DVD-R Digital Versatile Disk Recordable. DVD-RAM Digital Versatile Disk Rewritable Access Media. DVD-ROM Digital Versatile Disk Read Only Media. DVD+RW Digital Versatile Disk ReWritable. DVI Digital Video Interactive (Intel). DX X86 Intel CPU with FPU (386/DX , 486/DX). DX3D DirectX 3D APIs (Microsoft Windows 9x/2000/Millennium). DXF AutoDesk picture File. DXR2 Dynamic eXtended Resolution 2 technology (Creative Labs DVD). DXTC S3 DirectX3D Texture Compression APIs (S3 Savage3D/2000). E EAX Environmental Audio EXtensions (Creative Labs DirectSound 3D Live! surround sound extensions). EBDA Extended BIOS Data Area. EBIOS Extended Basic Input/Output System. ECC Error Correction Code. ECP Extended Capabilities Port. EDC Error Detection Code. EDI Electronic Data Interchange. EDO Extended Data Out (DRAM). EDRAM Enhanced Dynamic Random Access Memory. edu When this appears at the end of an address it usually means that the address holder works for an educational establishment. EECS Enhanced Elliptical Correction System (Sony CRT). EEPROM Electrically Erasable Programmable Read Only Memory. EGA Extended Graphics Adapter. EIA Electronics Industries Association. EICA Enhanced Intellight Cooler Architecture. EIDE Enhanced IDE. EISA Extended Industry Standard Architecture. EISCA Enhanced Intelligent System Cooler Architecture (CPU heatsink). E-mail Electronic mail. EMM386 Microsoft 386 Expanded Memory Manager (EMM386.EXE). EMB Extended Memory Block. EMI ElectroMagnetical Interference. EMS Expanded Memory Specifications. EMM Expanded Memory Manager. EPA Environmental Protection Agency. EPIC Explicitly Parallel Instruction Computing (Intel/HP). EPP Enhanced Parallel Port. EPROM Erasable Programmable Read Only Memory. EPS Encapsulated PostScript File. ESCD Extended System Configuration Data (ROM BIOS). ESD ElectroStatic Discharge. ESDI Enhanced System Device Interface. ESDRAM Enhanced Synchronous Dynamic Random Access Memory. EULA End User License Agreement. EUV Extreme UltraViolet lithography (CPU). F FAQ Frequently Asked Questions. FAST-20 Fast SCSI-3 Parallel Interface standard. FAT File Allocation Table. FAT16 File Allocation Table 16-bit (MS-DOS). FAT32 File Allocation Table 32-bit (Windows 95/98). FCBS File Control Blocks. FC-AL Fibre Channel Arbitrated Loop (Ultra Fast SCSI). FCC Federal Communications Commission (USA). FC-PGA Flip Chip Pin Grid Array package (Intel Pentium III E CPU). FC-PH Fibre Channel PHysical and signaling interface (SCSI-3). FD Floppy Disk (Drive). FDDI Fiber Distributed Data Interface. FED Field Emission Display. FIFO First In First Out. FMD Fluorescent Multilayer Disc (C3D 140 GB CD-ROM technology). FMV Full Motion Video. FPD Flat Panel Display. FPE File Protection Error. FPM Fast Page Mode (DRAM). fps frames per second. FPU Floating Point Unit (coprocessor). FRAM Ferroelectric Random Access Memory. Frame-buffer 1st + 2nd dimensions/height + width/x + y axes memory (2D video). FSB Front Side Bus (motherboard CPU to I/O bus). FTP File Transfer Protocol. A method of transferrinf files from one computer to another that allows both computers to confirm successful receipt. Full-Duplex Two way modem communication protocol (echo-plex). FXT1 Advanced Texture Compression technology (3Dfx). G GB GigaByte (1 GB = 1024 MegaBytes = 1048576 KiloBytes). GBps GigaBytes per second. gbps gigabits per second. GDI Graphics Device Interface. GEM Ventura/GEM image file. GIF Graphics Interchange Format (CompuServe). Glide 3Dfx Voodoo family proprietary 3D APIs. G.Lite ITU G.992.2 1.4 Mbps Digital Subscriber Line modem standard (ADSL). GM General MIDI standard. gov When this appears at the end of an address it usually means the address holder works for the US Federal Government GPF General Protection Fault (Microsoft Windows). GMR Giant MagnetoResistive effect (IBM hard drive). GPU Graphics Processing Unit (nVidia GeForce 256 2D/3D). GUI Graphical User Interface. GVIF Gigabit Video InterFace (Sony LCD). H HAL Hardware Abstraction Layer (3D video). Half-Duplex One way modem communication protocol (simplex or local-echo). HAVi Home Audio Video interoperability (entertainment APIs). HD Hard Disk (Drive). HDA High reliability Hard Disk Assembly. HDD Hard Disk Drive. HDSL High bit rate Digital Subscriber Line modem. HDSS Holographic Data Storage System (IBM). HDTV High Definition TeleVision (new digital TV standard: 1200 lines). HEL Hardware Emulation Layer (Microsoft Direct3D). HFC Hybrid Fiber Coaxial cable system. HFS Hierarchical File System (CD-ROM, MacOS). HGL Hewlett Packard Graphics Language image file. HID Human Interface Devices. HiFD High density 200 MB Floppy Drive standard (Sony/Fuji). Hi-Fi High Fidelity (audio/video). HIMEM Microsoft HIgh/Extended MEMory Manager (HIMEM.SYS). HIPPI HIgh Performance Parallel Interface (ANSI X3T9.3 standard). HMA High Memory Area. HP Hewlett Packard Corporation. HPC Handheld Personal Computer. HPFS High Performance File System (OS/2). HSDRAM High Speed Synchronous Dynamic Random Access Memory. HTML HyperText Markup Language (W3C). HTTP HyperText Transfer Protocol. HVD High Voltage Differential standard (SCSI-2). Hz Hertz (clock speed): 1 Hz = 1 clock cycle. I IA-32 Intel Architecture 32-bit (32-bit CPU). IA-64 Intel Architecture 64-bit (high-end 64-bit CPU). IBM International Business Machines Corporation. IC Interface Controller. ICD Installable Client Driver (Microsoft 3D). ICMP Internet Control Message Protocol. ICMPv6 Internet Control Message Protocol version 6. ICO ICOn graphic file (Microsoft Windows). ICS Internet Connection Sharing. IDCT Inverse Discreet Cosine Transform (DVD decoding). IDE Integrated Device (Drive) Electronics. IE Microsoft Internet Explorer. IEEE Institute of Electrical and Electronics Engineers. IEEE 1394 Institute of Electrical and Electronics Engineers FireWire peripheral devices high performance serial bus standard. IETF Internet Engineering Task Force. IFF Electronic Arts Image File. IFSHLP.SYS Installable File System HeLPer device driver (Microsoft Windows). IGMP Internet Group Management Protocol. IMA Interactive Music Architecture (Microsoft). IMAP Internet Mail Access Protocol. IMAP4 Internet Mail Access Protocol level 4. IMG GEM Paint image file. InterNIC Internet Network Information Center. I/O Input/Output. ION Integrated On-demand Network (Sprint FastBreak). IP Internet Protocol. IPF Invalid Page Fault (Microsoft Windows). IPv4 Internet Protocol version 4 (32-bit). IPv6 Internet Protocol version 6 (128-bit). IPX Internetwork Packet EXchange (Novell Netware). IRC Internet Relay Chat. IrDA Infrared Data Association. IRQ Interrupt ReQuest line. ISA Industry Standard Architecture. ISDN Integrated Services Digital Network. ISO International Organization for Standardization. ISO 9660 International Standard LOgical CD-ROM format (High Sierra). ISP Internet Service Provider. ITU International Telecommunications Union. J Java Sun Microsystems programming language. JAR Java ARchive file. JDK Java Developers Kit. JEDEC Joint Electronic Device Engineering Council. JFC Java Foundation Classes. JIF Joint Photographers Expert Group Image file. JPEG Joint Photographers Expert Group Picture standard. JPG Joint Photographers Expert Group Picture file. JVM Java Virtual Machine. K K56flex Lucent/Rockwell 56 kbps analog modem transfer standard. KB KiloByte (1 KB = 1024 Bytes). KBps KiloBytes per second. kbps kilobits per second. KNI Intel Katmai/Coppermine CPU New 70 MMX extensions. L L1 Level 1 cache (on CPU). L2 Level 2 cache (off CPU). L2TP Layer 2 Tunneling Protocol. L3 Level 3 cache (off CPU SMP). LAN Local Area Network. LAPM Link Access Protocol for Modems. LBA Logical Block Addressing (hard disk access). LBM DeLuxe Paint BitMap picture file. LCD Liquid Crystal Display. LDAP Lightweight Directory Access Protocol. LDIF Lightweight Data Interchange Format (e-mail). LED Light Emitting Diode. LEP Light Emitting Polymers technology (CDT monitor). LFB Linear Frame Buffer (2D video). LFN Long File Name (256.8 = Win32 32-bit). LFO Low Frequency Oscillator. LH LoadHigh. LIM Lotus/Intel/Microsoft expanded/extended memory specifications. LIMAD LInear MAgnetic Drive speaker technology (Soundmatters). LMDS Local Multipoint Distribution Service. LPC Low Pin Count interface specification (Intel). LPT Line PrinTer. LTO Linear Tape-Open technology (IBM, HP, Seagate). LVD Low Voltage Differential (SCSI-2). M MAC MAC Paint picture file. MAPI Messaging Application Program Interface. mil When these letters appear at the end of an email address or domain name, it means that the computer referred to is probably operated by some part of the US military. MB MegaByte (1 MB = 1024 KiloBytes = 1048576 bytes). MBps MegaBytes per second. mbps megabits per second. MBR Master Boot Record (partition table). MCA Multilink Channel Aggregation technology (Microsoft Windows 98). MCD Mini Client Driver (Microsoft 3D). MCGA MonoChrome Graphics Adapter. MCI Media Control Interface. MDA Modular Digital Architecture. MDI Multiple Document Interface. MDRAM Multibank Dynamic Random Access Memory (MoSys). MGA Monochrome Graphics Adapter. MHz MegaHertz (1 MHz = 1000 KHz = 1000000 Hz). MIDI Musical Instrument Digital Interface. MIME Multipurpose Internet Mail Extensions. MIP Multum In Parvum texture mapping. MIPS Millions of Instructions per Second. MLA Modern Languages Association. MLPPP MultiLink Point to Point Protocol. MMA MIDI Manufacturer's Association. MMVF MultiMedia Video Format (NEC DVD). MMX Intel Pentium/Pentium Pro CPU MultiMedia eXtensions. MMX2 Intel Pentium II CPU MultiMedia eXtensions 2nd generation. MO MagnetoOptical. MODEM MOdulator/DEModulator (data to analog converter/transmitter/receiver). MOV QuickTime MOVie file (Apple). MP3 MPEG-1 Audio Layer 3 compression/format standard. MPC Multimedia Personal Computer. MPEG Motion Picture Expert Group. MPEG-1 Motion Picture Expert Group 1 video compression standard. MPEG-2 Motion Picture Expert Group 2 video compression standard. MPG Motion Picture Expert Group compressed image file standard. MPGA Micro Pin Grid Array (370 pin Intel CPU). MR MagnetoResistive head technology (HDD). MRX MagnetoResistive EXtended head technology (IBM HDD). µs Microsecond (1/1,000000 = 1 millionth of a second). MS MicroSoft Corporation. MS-DOS MicroSoft Disk Operating System. MSCDEX MicroSoft Compact Disc EXtensions device driver (MSCDEX.EXE). MSD MicroSoft Diagnostics (MSD.EXE). MSKB MicroSoft Knowledge Base. MSP MicroSoft Paint picture file. MSRP Manufacturer Suggested Retail Price. MSS Maximum Segment Size (Internet protocol). MTBF Mean Time Between Failures. MTT MultiTransaction Timer (PCI). MTU Maximum Transmission Unit (Internet protocol). MUD MultiUser Domain. MVA Multidomain Vertical Alignment technology (LCD screen). N NC Network Computer. NDIS Network Driver Interface Specification layer. NetRoom Helix Software 386 Expanded Memory Manager (RM386.EXE). NFS Network File System. NGI Next Generation Internet foundation. NIC (1) Network Interface Card. NIC (2) Networked Information Center. NIST National Institute of Standards and Technology. NLP Natural Language Processing. NNTP Network News Transfer Protocol. NOS Network Operating System. ns Nanosecond (1/1,000,000,000 = 1 billionth of a second). NSFNET The National Science Foundation's network, a part of the Internet devoted to research and education, and funded by the US government. Took over from ARPAnet, the ancestor of the Internet NTFS Windows NT File System standard (32-bit). NTSC National Television Systems Committee (USA TV standard: 525 lines). NVRAM Non Volatile Random Access Memory. O OAW Optically Assisted Winchester technology (Seagate hard drive). OCR Optical Character Recognition. ODBC Open DataBase Connectivity. OEM Original Equipment Manufacturer. OGL OpenGL (see below). OLGA Organic Land Grid Array (Intel Pentium III CPU). OLE Object Linking and Embedding. OOB Out Of Band. OpenGL Silicon Graphics Open standard Graphical Language (32-bit 3D graphics architecture layout). OpenGVS Open Gemini Visual System 3D APIs standard. OPS Open Profiling Standard. OS Operating System. OS/2 IBM Operating System/2. OSD Open Software Distribution. OSR1 OEM Service Release 1 (Microsoft Windows 95 version 4.00.950 a: 1st release upgraded with SP1). Retail + OEM. OSR2 OEM Service Release 2 (Microsoft Windows 95 version 4.00.950 B/C: 2nd release). OEM only. P P II Intel Pentium II CPU (80686 Klamath/Deschutes/Xeon). P III Intel Pentium III CPU (80686 Katmai/Coppermine/Xeon). P5 Intel Pentium/Pentium Pro CPU (80586). P6 Intel Pentium II/III CPU (80686). PAL Phase Alternate Line (European TV standard: 625 lines). PAP Password Authentication Protocol. PBC Pipeline Burst Cache. PBM Portable BitMap UNIX picture file. PBSRAM Pipeline Burst Static Random Access Memory (CPU L2 cache). PC Personal Computer. PC99 Intel/Microsoft PC 1999 System Design Guide. PCB Printed Circuit Board. PCD Kodak Photo CD image file. PCI Peripheral Component Interconnect bus architecture: 32-bit, 33/66 MHz (Intel). PCI 2.1 Peripheral Component Interconnect 2.1 standard: 32-bit, 33/66 MHz (Intel). PCI 2.2 Peripheral Component Interconnect 2.2 standard: 32-bit, 33/66/133 MHz (Intel). PCI-X Peripheral Component Interconnect eXtended bus architecture: 64-bit, 133 MHz (Intel/Compaq/HP/IBM). PCL Printer Control Language. PCM Pulse Code Modulation. PCMCIA Personal Computer Memory Card International Association. PCS Personal Communications Service. PCX Zsoft PC Paintbrush Picture file. PDA Personal Digital Assistant. PDF Portable Document Format file (Adobe Acrobat). PDP Parallel Data Processing (Intel I-740). pel Picture ELement: RGB 3 dot pattern (color TV). Also pixel. Pentium Intel Pentium CPU (80586). Pentium Pro Intel Pentium Pro CPU (80586). Pentium II Intel Pentium II CPU (80686 Klamath/Deschutes/Xeon). Pentium III Intel Pentium III CPU (80686 Katmai/Coppermine/Xeon). PERL Practical Extraction and Report Language. PFPT Pure Flat Picture Tube. PGM Portable GrayMap UNIX picture file. PIC (1) Programmable Interrupt Controller. PIC (2) Lotus PICtor/PC Paint picture file. PIF Program Information File (Microsoft Windows). PIM Personal Information Manager. PING Packet InterNet Groper. PIO Programmed Input/Output. pixel PIcture ELement: RGB 3 dot pattern (color CRT). Also pel. PLEDM Phase-state Low Electron Drive Memory (Hitachi). PLGA Plastic Land Grid Array (Intel Pentium II CPU). PLL Phase Locked Loop (CPU clock multiplier chip). PMTU Path Maximum Transmission Unit (Internet protocol). PNG Portable Network Graphics file. PnP Plug and Play standard. POP (1) Post Office Protocol. PoP (2) Point of Presence. POP3 Post Office Protocol 3 standard. POST Power On Self Test (BIOS). POTS Plain Old Telephone Service. PPGA Plastic Pin Grid Array (370 pin Intel CPU). PPI Precise Pixel Interpolation (Intel I-740). PPM Portable PixelMap UNIX picture file. PPP Point to Point Protocol. PPTP Point to Point Tunneling Protocol. PRI Primary Rate Interface. PRML Partial Response Maximum Likelihood (hard drive). PRN PRiNter port. PS/2 IBM Personal System/2. PSD RGB/indexed PhotoShop image file (Aldus). PSTN Public Switched Telephone Network. PVR Personal Video Recorder (TV to digital). Q QBE Query By Example. QDR-SDRAM Quad Data Rate Synchronous Dynamic Random Access Memory. QEMM Quarterdeck 386 Expanded Memory Manager (QEMM386.SYS). QOS Quality Of Service. R RAID Redundant Array of Inexpensive Disks. RAM Random Access Memory. RAMDAC Random Access Memory Digital to Analog Converter. RARP Reverse Address Resolution Protocol. RAS (1) Sun Microsystems Raster image file. RAS (2) Row Access Strobe. RAS (3) Remote Access Service (Microsoft Windows NT/2000). RAVE Rendering Acceleration Virtual Engine (Apple). RAW Unencoded pixel data image file. RDF Resource Description Framework (Netscape Aurora). RDRAM Rambus Dynamic Random Access Memory. REG REGistry text/ASCII file (Microsoft Windows 9x/NT/2000/Millennium). Registry Microsoft Windows 9x/NT/2000/Millennium Registry database. RegEdit Microsoft Windows 9x/NT/2000/Millennium Registry Editor (REGEDIT.EXE). RegEdt32 Microsoft Windows NT/2000 Registry Editor (REGEDT32.EXE). RFC Request for Comments. RGB Red Green Blue picture encoding. RIMM Rambus Inline Memory Module. RISC Reduced Instruction Set Computing (CPU). RIVA Real Time Interactive Video and Animation (nVidia 3D). RLE CompuServe/Microsoft Windows Run Length Encoded graphic file. RM386 Helix Software 386 Expanded Memory Manager (RM386.EXE). ROM Read Only Memory. RPC Remote Procedure Calls. rpm Rotations Per Minute. RSA Public Key Encryption algorithms (RSA Data Security). RTC Real Time Clock (BIOS). RTF Rich Text Format (Microsoft Word). RWIN Receive WINdow (Internet protocol). S S3TC S3 Texture Compression architecture (S3 Savage3D/2000). SCSI Small Computers System Interface standard. SCSI-1 Small Computers System Interface 1 specifications. SCSI-2 Small Computers System Interface 2 specifications. SCSI-3 Small Computers System Interface 3 specifications. SDK Software Developers Kit. SDRAM Synchronous Dynamic Random Access Memory. SDS Satellite Data Service. SDX Storage Data Acceleration (Western Digital). SECAM SEquential Couleur Avec Mémoire (French TV standard: 819 lines). SECC Single Edge Contact Cartridge (Intel Pentium II CPU). SECC2 Single Edge Contact Cartridge 2 (Intel Pentium III CPU). SEL Software Emulation Layer (Microsoft Direct3D). SEPP Single Edge Processor Package (Intel Celeron CPU). SET Secure Electronic Transaction standard. SFN Short File Name (8.3 = MS-DOS 16-bit). SGI Silicon Graphics Incorporated. SGML Standard Generalized Markup Language (W3C). SGRAM Synchronous Graphics Random Access Memory. SIMD Single Instruction Multiple Data (Intel Pentium MMX). SIMM Single In-line Memory Module. SLC Subscriber Line Charge. SLDRAM Synchronous Link Dynamic Random Access Memory (Hyundai). SL-DRAM Synchronous Layout Dynamic Random Access Memory (Siemens/Micron). SLI Scan Line Interleave technology (3Dfx Voodoo2). SLIP Serial Line Internet Protocol. SLM Spatial Light Modulator. SMART Self Monitoring Analysis Reporting Technology standard. SMIL Synchronized Multimedia Integration Language (W3C). SMP Symetrical MultiProcessing standard. SMPTE Society of Motion Picture and Television Engineers. SMTP Simple Mail Transfer Protocol. S/NR Signal to Noise Ratio. SO-DIMM Small Outline Dual Inline Memory Module connector. SPD Serial Presence Detection (EEPROM). S/PDIF Sony/Philips Digital Interchange Format. SPI-2 SCSI Parallel Interface 2 standard (SCSI-3). SPI-3 SCSI Parallel Interface 3 standard (SCSI-3). SPP Standard Parallel Port. SQL Structured Query Language. SRAM Static Random Access Memory. sRGB 32-bit standard Red Green Blue color encoding (Microsoft/Hewlett Packard). sRGB64 64-bit standard Red Green Blue double-precision color encoding (Microsoft/Hewlett Packard). SSA Serial Storage Architecture bus/interface. SSE Streaming SIMD Extensions (Intel Pentium III Katmai/Coppermine). SSL Secure Sockets Layer. SSR Super Scalar Rendering (3D video). STA SCSI Trade Association. STD/VR STanDard Voltage Regulator (CPU). STM Scanning Tunneling Microscope. SVGA Super Video Graphics Array standard. SX X86 Intel CPU without FPU (386/SX, 486/SX). Sync SRAM Synchronous burst Static Random Access Memory (CPU L2 cache). T TAPI Telephony Application Programming Interface. TB TeraByte (1 TB = 1024 GigaBytes = 1048576 MegaBytes). T-Buffer Multiple Frame Buffer rendering engine (3Dfx). TCO Total Cost of Ownership. TCP Transmission Control Protocol. TCP/IP Transmission Control Protocol/Internet Protocol. TEC ThermoElectric Cooler (Peltier effect). TELNET A Windows program that allows to to log in remotely (barred by most firewalls) Texel Bilinear TEXtured pixEL (3D video). TFT Thin Film Transistor (active matrix display). TFTP Trivial File Transfer Protocol. TGA TrueVision Graphic file (Targa). THD Total Harmonic Distortion. THX LucasFilm Home/Cinema Theatre Hi-Fi Dolby Digital Surround audio/video standard (RE: George Lucas' first movie: "THX 1138"). TIFF Tagged Image File Format (Aldus). T&L Transform & Lighting (3D video). TMM Terabit Molecular Memory technology (Toshiba DVD). TNT TwiN Texel processing engine (nVidia RIVA TNT 2D/3D). TNT2 TwiN Texel 2 processing engine (nVidia RIVA TNT2 2D/3D). TPU Texture Processing Unit (3Dfx Voodoo/Voodoo2/Voodoo3). TSR Terminate and Stay Resident program/device/driver. TTF True Type Font. TTL Time To Live (Internet protocol). TWI True Web Integration (Microsoft). U UAE Unrecoverable Application Error. UART Universal Asynchronous Receiver Transmitter. U-ATA Ultra Advanced Technology Attachment (EIDE drive). UCE Unsolicited Commercial Email. UDF Universal Disk Format (Compact Disk). U-DMA Ultra Direct Memory Access (EIDE drive controller). UDP User Datagram Protocol. UDSP Uniprocessor Digital Signal Processor Drive Electronics based architecture. UHF Ultra High Frequency. Ultra160/m SCSI Ultra3 SCSI standard (160 MB/s burst transfer rate). Ultra2b SCSI Ultra2 SCSI standard (80 MB/s burst transfer rate). Ultra DMA Ultra Direct Memory Access (EIDE drive controller). Ultra SCSI Ultra1 SCSI standard (40 MB/s burst transfer rate). UMA Upper Memory Area. UMB Upper Memory Block. UMR Upper Memory Region. UNC Uniform Naming Convention. UNIX MultiUser Network Operating System. UPS Uninterruptible Power Supply. URI Uniform Resource Identifier. URL Uniform Resource Locator. URM Universal Retention Mechanism (Slot 1 CPU). USB Universal Serial Bus. USENET USEr NETwork (newsgroups). USR U. S. Robotics (3Com modem brand). UUE Uniform Resource Locator UNIX Encoded. UUENCODE Unix to Unix Encoding. V V.90 ITU PCM 56 Kbps analog modem transfer standard. VAR Value Added Reseller. VAT Virtual Allocation Table (Compact Disk). VBE VESA BIOS Extensions. VBI Vertical Blanking Interval. VCP Video Cassette Player. VCPI Virtual Control Program Interface. VCR Video Cassette Recorder. VDSL Variable Digital Subscriber Line modem. VESA Video Electronics Standards Association. VFAT Virtual File Allocation Table (Microsoft Windows). VFIR Very Fast InfraRed protocol (Hewlett Packard). VfW Video for Windows. VGA Video Graphics Array standard. VHD Very High Density connector standard (Centronics). VHF Very High Frequency. VIS Visual Image Size. VLB VESA Local Bus (VL bus). VLM Very Large Memory addressing (Intel Merced). VLSI Very Large Scale Integration. VMM (1) Virtual Memory Manager. VMM (2) Virtual Machine Monitor. VoIP Voice over Internet protocol. VPN Virtual Private Network. VR (1) Virtual Reality. VR (2) Voltage Regulator (CPU). VRE Voltage Regulator Enhanced (MMX CPU). VRAM Video Random Access Memory. VRM Voltage Regulator Module. VRML Virtual Reality Modeling Language. VSA-100 Voodoo Scalable Architecture (3Dfx Napalm 3D chipset). VSM Virtual Storage Management (Microsoft Windows). VXD Virtual eXtended (everything) device Driver (Microsoft Windows). W W3C World Wide Web Consortium. WAIS Wide Area Information Server. WAN Wide Area Network. WAR Wide Aspect Ratio display. WBEM Web Based Enterprise Management Initiative. WDM Win32 Driver Model. WfM Wired for Management. WfWG Microsoft Windows for WorkGroups 3.1x. Win2000 Microsoft Windows 2000 (formerly NT 5.0). Win2K Microsoft Windows 2K (2000). Win31 Microsoft Windows 3.1x. Win32 Microsoft Windows 32-bit OS. Win32s Microsoft Windows 32-bit extensions for Windows/WfWG 3.1x 16-bit. Win95 Microsoft Windows 95 (4.0x.xxxx). Win98 Microsoft Windows 98 (4.1x.xxxx). WinMill Microsoft Windows Millennium. WinNT Microsoft Windows NT 3.xx/4.0x/5.0 (New Technology). WIP Web Interoperability Pledge (ZDNet). WMF Microsoft Windows MetaFile. WORM Write Once Read Many (CD-R). WOSA Windows Open Services Architecture. WPE Windows Protection Error (Microsoft Windows). WPG WordPerfect Graphic file. WRAM Windows Random Access Memory. WTX Workstation Advanced Technology EXtended (Intel motherboard form factor). WWIF World Wide InterFace. WWW World Wide Web. WYSIWYG What You See Is What You Get. X x2 3Com/US Robotics 56 kbps analog modem transfer standard. X86 Intel X86 CPU (family compatible). X87 Intel X87 FPU (family compatible). XHTML EXtensible Hypertext Markup Language (W3C). XLL EXtensible Link Language (W3C). XML EXtensible Markup Language (W3C). XMM EXtended Memory Manager. XMS EXtended Memory Specifications. XSL EXtensible Style Language (W3C). XT EXtended Technology (Intel motherboard form factor). XVGA EXtended Video Graphics Array. Y ZAK Zero Administration Kit for Windows NT workstations. ZAW Zero Administration initiative for Windows. Z-buffer Third (3rd) dimension/depth/z axis memory (3D video). ZIF Zero Insertion Force (CPU socket). 286 Intel 80286 processor. 2D Two (bi) Dimensional: x and y axes. 2K 2000. 386 Intel 80386 processor. 386MAX. Qualitas 386 Expanded Memory Manager (386MAX.SYS) 3D Three (tri) Dimensional: x, y and z axes. 3dfx 3d Graphics Interactive (Voodoo family 3D chipsets). 3DNow! AMD K6/K7 CPU multimedia extensions. 3DRAM 3D Dynamic Random Access Memory. 486 Intel 80486 processor. 586 Intel 80586 processor (Pentium/Pentium Pro). 686 Intel 80686 processor (Pentium II/III). 86 Intel 80X86 central processing unit (CPU). 87 Intel 80X87 floating point unit (FPU).
From the early 1980s onward, a flourishing culture of local, MS-DOS-based bulletin boards developed separately from Internet hackerdom. The BBS culture has, as its seamy underside, a stratum of `pirate boards' inhabited by crackers, phone phreaks, and warez d00dz. These people (mostly teenagers running IBM-PC clones from their bedrooms) have developed their own characteristic jargon, heavily influenced by skateboard lingo and underground-rock slang. Though crackers often call themselves `hackers', they aren't (they typically have neither significant programming ability, nor Internet expertise, nor experience with UNIX or other true multi-user systems). Their vocabulary has little overlap with hackerdom's. Nevertheless, this lexicon covers much of it so the reader will be able to understand what goes by on bulletin-board systems. Here is a brief guide to cracker and warez d00dz usage: Misspell frequently. The substitutions phone => fone freak => phreak are obligatory. Always substitute `z's for `s's. (i.e. "codes" -> "codez"). The substitution of 'z' for 's' has evolved so that a 'z' is bow systematically put at the end of words to denote an illegal or cracking connection. Examples : Appz, passwordz, passez, utilz, MP3z, distroz, pornz, sitez, gamez, crackz, serialz, downloadz, FTPz, etc. Type random emphasis characters after a post line (i.e. "Hey Dudes!#!$#$!#!$"). Use the emphatic `k' prefix ("k-kool", "k-rad", "k-awesome") frequently. Abbreviate compulsively ("I got lotsa warez w/ docs"). Substitute `0' for `o' ("r0dent", "l0zer"). TYPE ALL IN CAPS LOCK, SO IT LOOKS LIKE YOU'RE YELLING ALL THE TIME. These traits are similar to those of B1FF, who originated as a parody of naive BBS users; also of his latter-day equivalent Jeff K.. Occasionally, this sort of distortion may be used as heavy sarcasm by a real hacker, as in: > I got X Windows running under Linux! d00d! u R an 31337 hax0r The only practice resembling this in actual hacker usage is the substitution of a dollar sign of `s' in names of products or service felt to be excessively expensive, e.g. Compu$erve, Micro$oft.
www.astalavista.com www.astalavista.net www.antionline.com www.netcraft.com ....highy recomended for users who want to break into websites. www.hackersclub.com/km www.rootshell.com www.free-ed.net www.hackers2k.bizland.com...........current under devopment but will be up soon with thousands of tutorials write by my self and by others. www.happyhacker.org ....recommended for newbies,also has links to free shell accounts. www.perl.com........get the lastest information on perl including downloads for windows. www.download.com ..........has lots of networking and programming tools. www.whatis.com www.hackernews.com www.ntsecurity.com www.microsoft.com/security www.linuxnewbie.com www.textsfile.com www.packetstorm.securify.com i wont mention any more because when u visit these sites there thousand
of more
alt.2600.hackerz alt.2600.hackers......recommended,currently its probalry the best one out. alt.unix alt.security I wont mention any more newsgroups,but u can find lots more by searching!,but
i
CONNECTIVITY TOOLS FILE TRANSFERE UTILITIES. REMOTE UTILITIES INTERNET TOOLS NOTE:these are basic program ,theres thousands more like dig,pc
These can usally be learned eaisly in 3 months and upwards,once u learn these stuff everything else becomes easily to learn.
new note:visual basic isnt as bad as described ,it can be quite useful
and 9.Credit card fraud. 10.DoSing
|
Credits: |
http://blacksun.box.sk written by shady_harrasment_panda Email kev_harrasment_panda@yahoo.co.uk /*DICTIONARY NOTE:i would like to thank k1ng for personally sending me
an |