1. Trang chủ
  2. » Giáo Dục - Đào Tạo

Hacker Dictionary Guide

72 533 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

::::::::: :::::::: ::::::::: :::::::::: :+: :+: :+: :+: :+: :+: :+: +:+ +:+ +:+ +:+ +:+ +:+ +#++:++#+ +#++:++#++ +#++:++#: :#::+::# +#+ +#+ +#+ +#+ +#+ +#+ #+# #+# #+# #+# #+# #+# #+# ######### ######## ### ### ### http://blacksun.box.sk written by shady_harrasment_panda kev_harrasment_panda@yahoo.co.uk Email /*DICTIONARY NOTE:i would like to thank k1ng for personally sending me an acronyms list although as you would agree this dictionary isnt an acroyms dictionary but a very comprehensive hacking dictionary.*/ Updated hacker dictionary READ THIS NOW! To contribute to this dictionary email kev_harrasment_panda@yahoo.co.uk or contact the group the main contributers so far are shady_harrasment_panda(wrote most of it),k1ng(contributed some usefull words) and a acromyn list), If u are viewing the text guide u can use the text seach box to search for an word or u can use the coded search box on the html version I wasn't sure whether to include normal computer words so i made the dictionary of words which are relevent to hackers!,but as the text gets larger i will inlude more hacking words NOTE FOR HACKERS:this is an newbie version of the dictioanry with all the common hacker words,for a 5MB dictioanry with harder words which are harder to understand goto This is a dictioanry on hacking words so if u read a hacking tutorial and dont understand anything u will find the answer here,also i didnt include words such as fdisk,486,intel,THIS IS NOT A COMPUTER DICTIONARY BUT A HACKING DICTIONARY so if your using it to looking for a graphics word !it wont be there Tip:for more adation words related to programming and networks try www.whatis.com Hacker terms info:over the internet there thousands of hacking tutorials freely avalible,usally such texts have words in hacker slang which newbies fail to understand.This dictioanry is trying to change that although i must admit as being the main author i have a pretty big task a head of me to make it the BEST and not nessisary the biggest hacking dictioanry ever!,i have came accross lots of hacking dictioanrys but the biggest i saw was Mb so over the next months i am trying to make this dictioanry better than that one so with your help email me and inlude your contributing.My aim is to inlude all programming,networking,hacker slang and underground words.the biggest one i saw was made by hundreads of ppl and useneters so if u want a challenge get wriitng!>>>> to make it better i have included irc slang,hacking guides,port numbers e.t.c,also i promise u that this text is the best understandle hacker dictioanry on the web so if u dont understand anything email me note:when i say the best dictioanry it doesnt have to be the most advanced but the most easy to understand.Hackers will note this guide is more than a dictioanry it has port numbers and all sorts of usefull info,also the guide is split into different section,e.g dictionary section,irc section and www section HACKER DICTIONARY beta vesrion 1.1 =================================== >.ACCESS:the ability to get into something or locate something on a network or local machine >.ACCESS CODE:also known as login name or user id and password on a network which reguires u to login >ACCESS PERMISIONS:this allows u to execute,read or change a file depending on the permsion >.ACCOUNT:your presence id on a computer system which allows u to login >.ADAPTER:another name for an expansion card,usally most of them plug into your expansion slots on your pc >ACTIVE X:a set of interacitve techonloiges devloped by microsoft,activex isnt a programming language but it can be dangerous for website viruses >ACTIVE OPEN:a state in which TCP is attempting to initiate a connection >ADDRESS:a memory location.The value is often displayed as hexadecimal,mostly to keep anyone but official pc postal employes from finding things on your computer>every thing on your hard drive has a memory location >ADDRESS CLASS:a basic network of various sises.the network class can be determend from the first octet of its ip address >ADDRESS RESOULUTION PROTOCOL:the process of determining a MAC address, given a more abstract LAN or WAN address Any protocol used to obtain a mapping from a higher layer address to a lower layer address Abbreviated ARP The acronym ARP is most often used to refer to the Ethernet Address Resolution Protocol (below) The protocol used by an IP networking layer to map IP addresses to lower level hardware (i.e., MAC) addresses There are four ARP messages for IP running over Ethernet: arp requests and replies and reverse arp request and replies ADSL:adsl(asymetic digital subscriber line):is a connection to the net were users dont use dial up but have a connection 24/7 and usally have a static ip address >ADA: Pascal-descended language that was at one time made mandatory for Department of Defense software projects by the Pentagon Hackers are nearly unanimous in observing that, technically, it is precisely what one might expect given that kind of endorsement by fiat; designed by committee, crockish, difficult to use, and overall a disastrous, multi-billion-dollar boondoggle (one common description wss "The PL/I of the 1980s") Hackers find Ada's exception-handling and inter-process communication features particularly hilarious Ada Lovelace (the daughter of Lord Byron who became the world's first programmer while cooperating with Charles Babbage on the design of his mechanical computing engines in the mid-1800s) would almost certainly blanch at the use to which her name has latterly been put; the kindest thing that has been said about it is that there is probably a good small language screaming to get out from inside its vast, elephantine bulk >AGENT:A program that performs one or more services (such as gathering information from the Internet), acting for or as a principal >ADVANCED PEER-TO-PEER NETWORKING(APPN):An IBM peer-to-peer networking architecture that uses interconnected Type 2.1 nodes APPN supports dynamic routing,directory searches, and network management >ADVANCED PROGRAM-TO-PROGRAM COMMUNICATIONS(APPC) SNA's standard program-to-program communications protocol Sometimes the term APPC is used interchangeably with Logical Unit Type 6.2 (LU 6.2) ALERT:A problem determination message sent to a network operator within IBM's network management system >ALOHA :A 4800bps Contention Based Radio Channel Transmission System Network used in the University of Hawaii (1968 - 1972) and designed by Morman Abramson to connect the university's mainfraim IBM 360 on the Island of Oahu and terminals plaaced throught different ships and nearby islands Data coming from the mainfraim was sent to all other terminals while data from terminals was the Contention-Based part and would re-send data if no acknowledement data was received VLAN : Virtual Local Area Network This is a network split into workgroups by routers and each assigned a server As any message sent will have which workgroup it is aimed at, wokgroups not receiving messages can run faster as traffic is reduced Standards - Ethernet : A Network standard that is a Contention-Based Network Ethernet evolved from a radio channel transmission system called ALOHA >ALT:is commenly known as a computer control key but in internet terms alt is for connecting to newsgroups just like www is for connecting to the web >ALT.2600.hackers:is a newsgroup with about 200 posters and about 5000 lurkers,it is the group shady_harrasment_panda(writter of this dictioanryis a member of.alt.2600.hackers has alot of very intellegent hackers in the group >ALTERNITIVE CLIENT RESTOREL:The process of restoring files to a different client than the one from which they were backed up >.AMERICAL ONLINE(AOL):a large US owned internet service provider company which mainly attracts newbies,aol has the stricted rules out of all the isp ifu post to an hackers newsgroup they terminate your account!,aol commenly attracks lamers! >.ANTIVIRUS:a program which scans a users hard drive looking for known viruses,worms,trojans,and joke files >AMIGA:A series of personal computer models originally sold by Commodore, based on 680x0 processors, custom support chips and an operating system that combined some of the best features of Macintosh and Unix with compatibility with neither The Amiga was released just as the personal computing world standardized on IBM-PC clones This prevented it from gaining serious market share, despite the fact that the first Amigas had a substantial technological lead on the IBM XTs of the time Instead, it acquired a small but zealous population of enthusiastic hackers who dreamt of one day unseating the clones (see Amiga Persecution Complex) The traits of this culture are both spoofed and illuminated in The BLAZE Humor Viewer The strength of the Amiga platform seeded a small industry of companies building software and hardware for the platform, especially in graphics and video applications (see video toaster) Due to spectacular mismanagement, Commodore did hardly any R&D, allowing the competition to close Amiga's technological lead After Commodore went bankrupt in 1994 the technology passed through several hands, none of whom did much with it However, the Amiga is still being produced in Europe under license and has a substantial number of fans, which will probably extend the platform's life considerably viruses,common virus scanners include norton and mcafee >AMP OFF:[Purdue] vt To run in background From the UNIX shell `&' >ANSI; n [techspeak] The American National Standards Institute ANSI, along with the International Organization for Standards (ISO), standardized the C programming language (see K&R, Classic C), and promulgates many other important software standards n [techspeak] A terminal may be said to be `ANSI' if it meets the ANSI X.364 standard for terminal control Unfortunately, this standard was both over-complicated and too permissive It has been retired and replaced by the ECMA-48 standard, which shares both flaws n [BBS jargon] The set of screen-painting codes that most MS-DOS and Amiga computers accept This comes from the ANSI.SYS device driver that must be loaded on an MS-DOS computer to view such codes Unfortunately, neither DOS ANSI nor the BBS ANSIs derived from it exactly match the ANSI X.364 terminal standard For example, the ESC-[1m code turns on the bold highlight on large machines, but in IBM PC/MS-DOS ANSI, it turns on `intense' (bright) colors Also, in BBS-land, the term `ANSI' is often used to imply that a particular computer uses or can emulate the IBM high-half character set from MS-DOS Particular use depends on context Occasionally, the vanilla ASCII character set is used with the color codes, but on BBSs, ANSI and `IBM characters' tend to go together >ANGLE BRASKET: Either of the characters `.APPLE TALK:a local area network devloped by APPLE to connect IBM pc's and macs together >APPLET:a HTML based program built with java that a browser tempory downloads to a users disk >APPLICATION LAYER:the layer of tcp/ip stack that supports network applications and provides an interface to the local operating environement 11.ARCHIE:a program to search things on the net,search engines like yahoo are talking over from archie >APACHE:is a webserver used by almost 60 per cent of the web sites market that runs on windows,macs,and unix .>APP: Short for `application program', as opposed to a systems program Apps are what systems vendors are forever chasing developers to create for their environments so they can sell more boxes Hackers tend not to think of the things they themselves run as apps; thus, in hacker parlance the term excludes compilers, program editors, games, and messaging systems, though a user would consider all those to be apps (Broadly, an app is often a self-contained environment for performing some well-defined task such as `word processing'; hackers tend to prefer more general-purpose tools.) See killer app; oppose tool, operating system >.APPLE SHARE:a network o/s devloped by apple to work with other macs,like win nt and win ME are desined to work the together >ARCHIE:a client/server program that is used to locate files on anonymous ftp >.ARCHIVE:a place with important files on the net >AREA CODE:area code is the code for a phone number for ppl accesing it outside the city,dial up hacking or connecting to your isp involves uses an area code >.ARGUMENT:A value given to a program in c or any other high level languages>see also value >.ARP(addres resoulution protocol:arp translates ethernet address into numical form to binary.all o/s support arp by typing arp in the command prompt >APRAnet(advanced research projects agency network)is a denfence agency network created by defense department of the USA known now as da-apra >ARM(application response measurement): >.ARRAY:a collectiong of similar info such as codes,text or other items.All items are usally of the same type,used in programming >.ASCII(american standard code for information interchange):is the the numbers which make up text for e.g the code 52 would be the number >ASCII ART: n The fine art of drawing diagrams using the ASCII >ASM(asembly language):is a low level program language which is used for writting small programs and can be used to write viruses.Assembly Languages have the same basic structure as Machine Languages, the difference is that Assembly Languages allow the programmer to use names instead of numbers As with Machine Languages, every CPU has its own unique machine language Programs must be rewritten or recompiled, therefore, to run on different types of computers Nowadays most programming is done with High-Level Programming Languages but in the early days, Assembly language was always used, now it is ONLY used when speed is essential or when the task isn't possible on the High-Level Language we are using These are considered Low-Level Languages as they are closer to Machine Languages >ASYNCHRONOUS TRANSFERE METHOD:A connection-oriented data communications technology based on switching 53 byte fixed-length units of data called cells Abbreviated ATM Each cell is dynamically routed ATM transmission rates are multiples of 51.840 Mbits per second In the United States, a public communications service called SONET uses ATM at transmission rates of 155, 622, 2048, and 9196 Mbits per second These are called OC-3, OC-12, OC-48, and OC-192 respectively A similar service called SDH is offered in Europe ATM is also used as a LAN infrastructure, sometimes with different transmission rates and coding methods than are offered with SONET and SDH >AT&T:american phone company there are also the makers of unix,at&t owns the bells lab which wrote unix and c >AUTHENTICATION: A security measure for verifying the identity of network users >AVATAR:The body in cyberspace In most cases the handle/nicknames you use on the Internet, and the personality that goes with it >AWK: [UNIX techspeak] An interpreted language for massaging >BACKDOOR:is a hiding bit of code which a programer makes so that he can hide a secret password which only he knows.>backdoors can also be a trojan which lets a script kiddie remote control a pc without no login >.BANDWITH:the speed of which is sent to the moniter meguared in hertz >BASEBAND:the most common type of network where data is transmiited digailay through a wire >.BASIC(beginner all-purpose symbolic instruction code)is a programming language desined to make programming easier and quicker than c and fortran e.t.c.,modern verions of basic are visual basic and quickbasic BAUD RATE:is usally related to the speed of the modem for.e.g 56k >BAYONET NEIL COUCILMAN:connector):A type of coaxial cable connector sometimes used in Ethernet applications Abbreviated BNC The specification for BNC connectors is contained in EIA/TIA 403-A and MIL-C-39012 > BER(Bit Error Rate.): >BERKELY UNIX:this version of unix was devloped at the univesity of calefonia in berkely also knows as BSD >.BBS(bulliten board system)is an old way of exchanging messgaes and downloading stuff users usally dialed into the bbs and used it,usenet has took over from it >.BIN:a binary file.Also on unix the binary files are usally in /bin and on windows c:\windows >.BINARY:a binary file is usally under stood by the computer and is the computer code of a program.binary is written in 0's and 1's >BIND:The SNA command that starts an SNA session between two logical units >BIOS PASSWORD:is a password utillity which lets users provide an on boot password by changing the bios settings,hackers cant usually get the password unless the computer is switched on and booted up to windows but u can reset he cosmos BLACK ICE:is a monetering program used for watching ports >BLACK HOLE:What data (a piece of email or netnews, or a stream of TCP/IP packets) has fallen into if it disappears mysteriously between its origin and destination sites (that is, without returning a bounce message) >BLACK SCREEN OF DEATH:On an attempt to launch a DOS box, a networked Windows system not uncommonly blanks the screen and locks up the PC so hard that it requires a cold boot to recover This unhappy phenomenon is known as The Black Screen of Death >BLUE SCREEN OF DEATH:is when a windows machine crahses or gets nuked and shows the blue screen which shows that an error has occured >BLUE BOX(not a hacker term but i will mention it): Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls Early phreakers built devices called `blue boxes' that could reproduce these tones, which could be used to commandeer portions of the phone network (This was not as hard as it may sound; one early phreak acquired the sobriquet `Captain Crunch' after he proved that he could generate switching tones with a plastic whistle pulled out of a box of Captain Crunch cereal!) There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc n An IBM machine, especially a large (non-PC) one >BLUE TOOTH:this is a specification for linkingdevices such as mobile phones,cameras e.t.c to computers over a short range wireless connection BRUTE FORCE:to try thousand of differnt passwords on a login prompt or on a password protected file >BSD:a unix o/s from berkely;s >.BUG:is when a program has errors written in it which makes it perform incorrect >Bus : Terminals are connected in a strait line with 'T' shape terminator at each end that bounce the signal back and forth through the network, peices of data send are limited and if they are send to n unknown terminal on the network the signal just keeps boucing, causing a crash of all the network The Bus network is a peer to peer network and had no dedicated server >BUS NETWORK:is a network where all computers are connected through a hub and each computer usuall has a network interface card 33.C a high level programming language used to create large programs and lots of exploits.e.g #include main ( ) { printf ("you are viewing the beta version.\n"); printf ("www."); } >.C++:an improved version of c that adds object-orented exstensions and is easy to learn for c programmers >CCC [Chaos Computer Club]:A hacker-organisation in Hamburg They have meetings, lectures and annual congresses which attracts hackers from all Europe They also publish books and magazines about the information society There are a lot of myths of which kind of criminal activities they have been involved in, so it's hard to say which of them is true and which are not >C SHELL:is a shell similar to the bash shell but it is more like the c langauge on a command promt >.CABLE MODEM:is a connection to the internet 24 hours a day and users dont use a dial up line instead they use a cable,usally cable modem customers have a static ip address >CACHE:is a tempory folder on a hard disk which stroes websites e.t.c so that a user can acces them quicker >CAIN:is a password cracker program which cracks windows share password and pwl files 36.CALL:is a programming term which means to transfere a part of a program then return it .CARRIIER(dial ups): a signal used by a modem to detect another modem >CASADING:The process of connecting two or more Fibre Channel hubs or switches together to increase the number of ports or extend distances >.CAT:a unix command which displays the contents of a file >CC(carbon copy)used for sending the same email to more than on person >.CD:change directory used for chaging the dir on all systems prompts also chdir .CGI(common gateway interface)is a web programming language which can be used for prompting a user for inforrmation and can be used for shoping sites to make secure transactions >CHANNEL:is a irc chat room where ppl chat >CHANNEL OP:is the person or person's on a channel who control it >CHAP(challenge handshake authentication protcol): >CHAR:shorthand for `character' Esp used by C programmers, as `char' is C's typename for character data >.CHAT:ovisly u know what a chat room is but certain network administraters have chat built into their security which means if there hacked they can disconnect u then chat and tell u that your traced e.t.c >CHECKSUM:a 16 bit calculated field used to ensure detection of currupted datagrams >CHERNOBYL PACKETL:A network packet that induces a broadcast storm and/or network meltdown, in memory of the April 1986 nuclear accident at Chernobyl in Ukraine The typical scenario involves an IP Ethernet datagram that passes through a gateway with both source and destination Ether and IP address set as the respective broadcast addresses for the subnetworks being gated between Compare Christmas tree packet CIRCLE:This is also a simple setup and poses most of the same problems as the bus NET Basically, it is just a Bus NET with the two spare ends connected to each other The main differences between this and the Bus NET is that, each computer acts as an amplifier to the signals passed along it (Active) There is also another communication method used here called token passing This consists of a token passing along the network, when a computer wishes to pass on information, it will be attached to the token the it will travel round the network until it finds its destination, The destination will then pick it up copy it and send a new token into the network If the information in a Circle NET does not find its destination, then it will go in a complete circle and return to the sender with a message, reporting the problem This type of topology is very similar to the Bus NET with the same drawbacks and the same advantages >CLUSTER CONTROL:The common name given to SNA Type 2.0 Peripheral Nodes Usually used to refer to 3270-type control units >CODEZ D00DZ:HACKERS's version of pirates >COMMUNICATION CONTROLER:An SNA communications processor whose operations are controlled by Network Control Program (NCP) software.Communication controllers manage communication links and route packets through SNA networks IBM's communication controller products include the 3745/3746, 3725, 3720, 3705, and 3704 >COMPUTER UNDERGROUD:A group organized in securcy, hidden behind aliases, to promote the exchange of information regarding anything and everything incuding, but not limited to: computers,hacking,telephones, radios, chemicals and ideas >CONNECTION-ORIENTED SERVICE/PROTOCOL:A service/protocol that includes the notion of a setup and take-down phasebefore and after the transfer of data These services usually includeerror detection and recovery, flow control, and packet sequencing >CONNECTION SERVICE/PROTOCOL: A service protocol that does not include the notion of a setup or take-down phase before and after the transfer of data Each message, commonly called a datagram, is sent as a separate entity >COSMOS)the complimaentry metal-oxide semiconductor):is a battery powered memory chip which is in the motherboard,it usally stores the bios password and date settings >.CISCO:cisco is the one of the leaders in the network market making network softwere and hardwere >CLASS C/B/A>NETWORK:is the way ppl are given an ip address from their isp or network proider,class c is the isp way for an ip address >CLI(Command line interface):is also known as an interface were u type commands such as in dos .CODE:programers instructions also known as programming language writting,code is the writting in a program which makes it perform to certain instruction and tasks >CODE BALANCE:The number of bits in a 10-bit transmitted data stream divided by 10 (e.g., 1110100011 has a code balance of 6/10 = 60%) >.COLLIO:is a US hacker cracker who nuked yahoo.com and ebay in early 2000 >.COM PORT:is a port on your computer were modem usally connect to >.COMMAND PROMPT:is the screen on an o/s which u can type commands e.g microsoft dos,lilo prompt,bash,csh prompt >.COMPILE:to convert programming code into machine language >.COMPILER:the tool which compiles the code in a program and changes it into machine language >Communication Controller: An SNA communications processor whose operations are controlled by Network Control Program (NCP) software communication controllers manage communication links and route packets through SNA networks IBM's communication controller products include the 3745/3746, 3725, 3720, 3705, and 3704 >.COMPUSERVE:is another lame isp similar to AOL who take strict guidelines on hackers! >Connection-Oriented Service/Protocol: A service/protocol that includes the notion of a setup and take-down phase D D3D DirectX 3D APIs (Microsoft Windows 9x/2000/Millennium) DAC Digital to Analog Converter DAT Digital Audio Tape dB deciBel (10 dB = Bel) DBS Digital Broadcasting System DC Direct Current DCE Data Communications Equipment (modem to modem speed) DDC Display Data Channel DDE Dynamic Data Exchange DDMA Distributed Direct Memory Access standard DDR-SDRAM Double Data Rate Synchronous Dynamic Random Access Memory DDSS Dolby Digital AC-3 5.1 Surround Sound standard (5 + = channels) DEK Data Encryption Key DES Data Encryption Standard DHCP Dynamic Host Configuration Protocol DHTML Dynamic HyperText Markup Language (W3C) DIB (1) RGB/RLE encoded Microsoft Windows Device Independent Bitmap DIB (2) Dual Independent Bus architecture (Intel Pentium Pro and Pentium II/III) DIG Digital Imaging Group DIMM Dual In-line Memory Module DIN Deutsches Institut für Normung (German Institute for Standards) DIP Dual In-line Package DIVX DIgital Video eXpress (discontinued DVD standard) DLC Data Link Control protocol DLL Dynamic Link Library DLP Digital Light Processing technology DLS DownLoadable Sounds standard (PCI MIDI) DMA Direct Memory Access DME Direct Memory Execution (Intel I-740) DMF Distribution Media Format: high density floppy disk (Microsoft) DMI Desktop Management Interface DMTF Desktop Management Task Force DNA Distributed interNet Applications architecture (Windows 98) DNS Domain Name Server A computer on the Internet which turns the people-friendly Internet domain names into the numerical IP addresses that computer use DOCSIS ITU J.112 Data Over Cable Service Interface Specification DOF Depth Of Field (3D video) DOM Document Object Model standard (W3C) DOS Disk Operating System DPI Dots Per Inch DPLSS Dolby Pro Logic Surround Sound standard (5 channels) DPMA Dynamic Power Management Architecture (Intel PCI/AGP chipsets) DPMI DOS Protected Mode Interface DPMS VESA Display Power Management Signaling standard DRAM Dynamic Random Access Memory DR-DOS Caldera Digital Research Disk Operating System Drive-TIP Drive Temperature Indicator Processor (IBM hard drive) DRP Distribution and Replication Protocol DRW Micrografx DRaW image file DS3D DirectXSound 3D APIs (Microsoft Windows 9x/2000/Millennium) DSC Digital Servo Control (Toshiba CD-ROM) DS/DD Double-Sided Double-Density (floppy disk standard: 720 KB) DS/HD Double-Sided High-Density (floppy disk standard: 1.44 MB) DSL Digital Subscriber Line modem DSP (1) Digital Signal Processor DSP (2) Delivery Service Partner (OEM) DSS (1) Digital Satellite System DSS (2) Digital Signature Standard certificate DSVD Digital Simultaneous Voice and Data DTD Document Type Definition DTE Data Terminal Equipment (modem to computer speed) DTP DeskTop Publishing DTR Data Transfer Rate (throughput) DTV (1) DeskTop Video DTV (2) Digital TeleVision DUN Dial-Up Networking (Microsoft Windows 95/98) DVD Digital Versatile (Video) Disc DVD-2 Second generation DVD drive DVD-R Digital Versatile Disk Recordable DVD-RAM Digital Versatile Disk Rewritable Access Media DVD-ROM Digital Versatile Disk Read Only Media DVD+RW Digital Versatile Disk ReWritable DVI Digital Video Interactive (Intel) DX X86 Intel CPU with FPU (386/DX , 486/DX) DX3D DirectX 3D APIs (Microsoft Windows 9x/2000/Millennium) DXF AutoDesk picture File DXR2 Dynamic eXtended Resolution technology (Creative Labs DVD) DXTC S3 DirectX3D Texture Compression APIs (S3 Savage3D/2000) E EAX Environmental Audio EXtensions (Creative Labs DirectSound 3D Live! surround sound extensions) EBDA Extended BIOS Data Area EBIOS Extended Basic Input/Output System ECC Error Correction Code ECP Extended Capabilities Port EDC Error Detection Code EDI Electronic Data Interchange EDO Extended Data Out (DRAM) EDRAM Enhanced Dynamic Random Access Memory edu When this appears at the end of an address it usually means that the address holder works for an educational establishment EECS Enhanced Elliptical Correction System (Sony CRT) EEPROM Electrically Erasable Programmable Read Only Memory EGA Extended Graphics Adapter EIA Electronics Industries Association EICA Enhanced Intellight Cooler Architecture EIDE Enhanced IDE EISA Extended Industry Standard Architecture EISCA Enhanced Intelligent System Cooler Architecture (CPU heatsink) E-mail Electronic mail EMM386 Microsoft 386 Expanded Memory Manager (EMM386.EXE) EMB Extended Memory Block EMI ElectroMagnetical Interference EMS Expanded Memory Specifications EMM Expanded Memory Manager EPA Environmental Protection Agency EPIC Explicitly Parallel Instruction Computing (Intel/HP) EPP Enhanced Parallel Port EPROM Erasable Programmable Read Only Memory EPS Encapsulated PostScript File ESCD Extended System Configuration Data (ROM BIOS) ESD ElectroStatic Discharge ESDI Enhanced System Device Interface ESDRAM Enhanced Synchronous Dynamic Random Access Memory EULA End User License Agreement EUV Extreme UltraViolet lithography (CPU) F FAQ Frequently Asked Questions FAST-20 Fast SCSI-3 Parallel Interface standard FAT File Allocation Table FAT16 File Allocation Table 16-bit (MS-DOS) FAT32 File Allocation Table 32-bit (Windows 95/98) FCBS File Control Blocks FC-AL Fibre Channel Arbitrated Loop (Ultra Fast SCSI) FCC Federal Communications Commission (USA) FC-PGA Flip Chip Pin Grid Array package (Intel Pentium III E CPU) FC-PH Fibre Channel PHysical and signaling interface (SCSI-3) FD Floppy Disk (Drive) FDDI Fiber Distributed Data Interface FED Field Emission Display FIFO First In First Out FMD Fluorescent Multilayer Disc (C3D 140 GB CD-ROM technology) FMV Full Motion Video FPD Flat Panel Display FPE File Protection Error FPM Fast Page Mode (DRAM) fps frames per second FPU Floating Point Unit (coprocessor) FRAM Ferroelectric Random Access Memory Frame-buffer 1st + 2nd dimensions/height + width/x + y axes memory (2D video) FSB Front Side Bus (motherboard CPU to I/O bus) FTP File Transfer Protocol A method of transferrinf files from one computer to another that allows both computers to confirm successful receipt Full-Duplex Two way modem communication protocol (echo-plex) FXT1 Advanced Texture Compression technology (3Dfx) G GB GigaByte (1 GB = 1024 MegaBytes = 1048576 KiloBytes) GBps GigaBytes per second gbps gigabits per second GDI Graphics Device Interface GEM Ventura/GEM image file GIF Graphics Interchange Format (CompuServe) Glide 3Dfx Voodoo family proprietary 3D APIs G.Lite ITU G.992.2 1.4 Mbps Digital Subscriber Line modem standard (ADSL) GM General MIDI standard gov When this appears at the end of an address it usually means the address holder works for the US Federal Government GPF General Protection Fault (Microsoft Windows) GMR Giant MagnetoResistive effect (IBM hard drive) GPU Graphics Processing Unit (nVidia GeForce 256 2D/3D) GUI Graphical User Interface GVIF Gigabit Video InterFace (Sony LCD) H HAL Hardware Abstraction Layer (3D video) Half-Duplex One way modem communication protocol (simplex or local-echo) HAVi Home Audio Video interoperability (entertainment APIs) HD Hard Disk (Drive) HDA High reliability Hard Disk Assembly HDD Hard Disk Drive HDSL High bit rate Digital Subscriber Line modem HDSS Holographic Data Storage System (IBM) HDTV High Definition TeleVision (new digital TV standard: 1200 lines) HEL Hardware Emulation Layer (Microsoft Direct3D) HFC Hybrid Fiber Coaxial cable system HFS Hierarchical File System (CD-ROM, MacOS) HGL Hewlett Packard Graphics Language image file HID Human Interface Devices HiFD High density 200 MB Floppy Drive standard (Sony/Fuji) Hi-Fi High Fidelity (audio/video) HIMEM Microsoft HIgh/Extended MEMory Manager (HIMEM.SYS) HIPPI HIgh Performance Parallel Interface (ANSI X3T9.3 standard) HMA High Memory Area HP Hewlett Packard Corporation HPC Handheld Personal Computer HPFS High Performance File System (OS/2) HSDRAM High Speed Synchronous Dynamic Random Access Memory HTML HyperText Markup Language (W3C) HTTP HyperText Transfer Protocol HVD High Voltage Differential standard (SCSI-2) Hz Hertz (clock speed): Hz = clock cycle I IA-32 Intel Architecture 32-bit (32-bit CPU) IA-64 Intel Architecture 64-bit (high-end 64-bit CPU) IBM International Business Machines Corporation IC Interface Controller ICD Installable Client Driver (Microsoft 3D) ICMP Internet Control Message Protocol ICMPv6 Internet Control Message Protocol version ICO ICOn graphic file (Microsoft Windows) ICS Internet Connection Sharing IDCT Inverse Discreet Cosine Transform (DVD decoding) IDE Integrated Device (Drive) Electronics IE Microsoft Internet Explorer IEEE Institute of Electrical and Electronics Engineers IEEE 1394 Institute of Electrical and Electronics Engineers FireWire peripheral devices high performance serial bus standard IETF Internet Engineering Task Force IFF Electronic Arts Image File IFSHLP.SYS Installable File System HeLPer device driver (Microsoft Windows) IGMP Internet Group Management Protocol IMA Interactive Music Architecture (Microsoft) IMAP Internet Mail Access Protocol IMAP4 Internet Mail Access Protocol level IMG GEM Paint image file InterNIC Internet Network Information Center I/O Input/Output ION Integrated On-demand Network (Sprint FastBreak) IP Internet Protocol IPF Invalid Page Fault (Microsoft Windows) IPv4 Internet Protocol version (32-bit) IPv6 Internet Protocol version (128-bit) IPX Internetwork Packet EXchange (Novell Netware) IRC Internet Relay Chat IrDA Infrared Data Association IRQ Interrupt ReQuest line ISA Industry Standard Architecture ISDN Integrated Services Digital Network ISO International Organization for Standardization ISO 9660 International Standard LOgical CD-ROM format (High Sierra) ISP Internet Service Provider ITU International Telecommunications Union J Java Sun Microsystems programming language JAR Java ARchive file JDK Java Developers Kit JEDEC Joint Electronic Device Engineering Council JFC Java Foundation Classes JIF Joint Photographers Expert Group Image file JPEG Joint Photographers Expert Group Picture standard JPG Joint Photographers Expert Group Picture file JVM Java Virtual Machine K K56flex Lucent/Rockwell 56 kbps analog modem transfer standard KB KiloByte (1 KB = 1024 Bytes) KBps KiloBytes per second kbps kilobits per second KNI Intel Katmai/Coppermine CPU New 70 MMX extensions L L1 Level cache (on CPU) L2 Level cache (off CPU) L2TP Layer Tunneling Protocol L3 Level cache (off CPU SMP) LAN Local Area Network LAPM Link Access Protocol for Modems LBA Logical Block Addressing (hard disk access) LBM DeLuxe Paint BitMap picture file LCD Liquid Crystal Display LDAP Lightweight Directory Access Protocol LDIF Lightweight Data Interchange Format (e-mail) LED Light Emitting Diode LEP Light Emitting Polymers technology (CDT monitor) LFB Linear Frame Buffer (2D video) LFN Long File Name (256.8 = Win32 32-bit) LFO Low Frequency Oscillator LH LoadHigh LIM Lotus/Intel/Microsoft expanded/extended memory specifications LIMAD LInear MAgnetic Drive speaker technology (Soundmatters) LMDS Local Multipoint Distribution Service LPC Low Pin Count interface specification (Intel) LPT Line PrinTer LTO Linear Tape-Open technology (IBM, HP, Seagate) LVD Low Voltage Differential (SCSI-2) M MAC MAC Paint picture file MAPI Messaging Application Program Interface mil When these letters appear at the end of an email address or domain name, it means that the computer referred to is probably operated by some part of the US military MB MegaByte (1 MB = 1024 KiloBytes = 1048576 bytes) MBps MegaBytes per second mbps megabits per second MBR Master Boot Record (partition table) MCA Multilink Channel Aggregation technology (Microsoft Windows 98) MCD Mini Client Driver (Microsoft 3D) MCGA MonoChrome Graphics Adapter MCI Media Control Interface MDA Modular Digital Architecture MDI Multiple Document Interface MDRAM Multibank Dynamic Random Access Memory (MoSys) MGA Monochrome Graphics Adapter MHz MegaHertz (1 MHz = 1000 KHz = 1000000 Hz) MIDI Musical Instrument Digital Interface MIME Multipurpose Internet Mail Extensions MIP Multum In Parvum texture mapping MIPS Millions of Instructions per Second MLA Modern Languages Association MLPPP MultiLink Point to Point Protocol MMA MIDI Manufacturer's Association MMVF MultiMedia Video Format (NEC DVD) MMX Intel Pentium/Pentium Pro CPU MultiMedia eXtensions MMX2 Intel Pentium II CPU MultiMedia eXtensions 2nd generation MO MagnetoOptical MODEM MOdulator/DEModulator (data to analog converter/transmitter/receiver) MOV QuickTime MOVie file (Apple) MP3 MPEG-1 Audio Layer compression/format standard MPC Multimedia Personal Computer MPEG Motion Picture Expert Group MPEG-1 Motion Picture Expert Group video compression standard MPEG-2 Motion Picture Expert Group video compression standard MPG Motion Picture Expert Group compressed image file standard MPGA Micro Pin Grid Array (370 pin Intel CPU) MR MagnetoResistive head technology (HDD) MRX MagnetoResistive EXtended head technology (IBM HDD) µs Microsecond (1/1,000000 = millionth of a second) MS MicroSoft Corporation MS-DOS MicroSoft Disk Operating System MSCDEX MicroSoft Compact Disc EXtensions device driver (MSCDEX.EXE) MSD MicroSoft Diagnostics (MSD.EXE) MSKB MicroSoft Knowledge Base MSP MicroSoft Paint picture file MSRP Manufacturer Suggested Retail Price MSS Maximum Segment Size (Internet protocol) MTBF Mean Time Between Failures MTT MultiTransaction Timer (PCI) MTU Maximum Transmission Unit (Internet protocol) MUD MultiUser Domain MVA Multidomain Vertical Alignment technology (LCD screen) N NC Network Computer NDIS Network Driver Interface Specification layer NetRoom Helix Software 386 Expanded Memory Manager (RM386.EXE) NFS Network File System NGI Next Generation Internet foundation NIC (1) Network Interface Card NIC (2) Networked Information Center NIST National Institute of Standards and Technology NLP Natural Language Processing NNTP Network News Transfer Protocol NOS Network Operating System ns Nanosecond (1/1,000,000,000 = billionth of a second) NSFNET The National Science Foundation's network, a part of the Internet devoted to research and education, and funded by the US government Took over from ARPAnet, the ancestor of the Internet NTFS Windows NT File System standard (32-bit) NTSC National Television Systems Committee (USA TV standard: 525 lines) NVRAM Non Volatile Random Access Memory O OAW Optically Assisted Winchester technology (Seagate hard drive) OCR Optical Character Recognition ODBC Open DataBase Connectivity OEM Original Equipment Manufacturer OGL OpenGL (see below) OLGA Organic Land Grid Array (Intel Pentium III CPU) OLE Object Linking and Embedding OOB Out Of Band OpenGL Silicon Graphics Open standard Graphical Language (32-bit 3D graphics architecture layout) OpenGVS Open Gemini Visual System 3D APIs standard OPS Open Profiling Standard OS Operating System OS/2 IBM Operating System/2 OSD Open Software Distribution OSR1 OEM Service Release (Microsoft Windows 95 version 4.00.950 a: 1st release upgraded with SP1) Retail + OEM OSR2 OEM Service Release (Microsoft Windows 95 version 4.00.950 B/C: 2nd release) OEM only P P II Intel Pentium II CPU (80686 Klamath/Deschutes/Xeon) P III Intel Pentium III CPU (80686 Katmai/Coppermine/Xeon) P5 Intel Pentium/Pentium Pro CPU (80586) P6 Intel Pentium II/III CPU (80686) PAL Phase Alternate Line (European TV standard: 625 lines) PAP Password Authentication Protocol PBC Pipeline Burst Cache PBM Portable BitMap UNIX picture file PBSRAM Pipeline Burst Static Random Access Memory (CPU L2 cache) PC Personal Computer PC99 Intel/Microsoft PC 1999 System Design Guide PCB Printed Circuit Board PCD Kodak Photo CD image file PCI Peripheral Component Interconnect bus architecture: 32-bit, 33/66 MHz (Intel) PCI 2.1 Peripheral Component Interconnect 2.1 standard: 32-bit, 33/66 MHz (Intel) PCI 2.2 Peripheral Component Interconnect 2.2 standard: 32-bit, 33/66/133 MHz (Intel) PCI-X Peripheral Component Interconnect eXtended bus architecture: 64-bit, 133 MHz (Intel/Compaq/HP/IBM) PCL Printer Control Language PCM Pulse Code Modulation PCMCIA Personal Computer Memory Card International Association PCS Personal Communications Service PCX Zsoft PC Paintbrush Picture file PDA Personal Digital Assistant PDF Portable Document Format file (Adobe Acrobat) PDP Parallel Data Processing (Intel I-740) pel Picture ELement: RGB dot pattern (color TV) Also pixel Pentium Intel Pentium CPU (80586) Pentium Pro Intel Pentium Pro CPU (80586) Pentium II Intel Pentium II CPU (80686 Klamath/Deschutes/Xeon) Pentium III Intel Pentium III CPU (80686 Katmai/Coppermine/Xeon) PERL Practical Extraction and Report Language PFPT Pure Flat Picture Tube PGM Portable GrayMap UNIX picture file PIC (1) Programmable Interrupt Controller PIC (2) Lotus PICtor/PC Paint picture file PIF Program Information File (Microsoft Windows) PIM Personal Information Manager PING Packet InterNet Groper PIO Programmed Input/Output pixel PIcture ELement: RGB dot pattern (color CRT) Also pel PLEDM Phase-state Low Electron Drive Memory (Hitachi) PLGA Plastic Land Grid Array (Intel Pentium II CPU) PLL Phase Locked Loop (CPU clock multiplier chip) PMTU Path Maximum Transmission Unit (Internet protocol) PNG Portable Network Graphics file PnP Plug and Play standard POP (1) Post Office Protocol PoP (2) Point of Presence POP3 Post Office Protocol standard POST Power On Self Test (BIOS) POTS Plain Old Telephone Service PPGA Plastic Pin Grid Array (370 pin Intel CPU) PPI Precise Pixel Interpolation (Intel I-740) PPM Portable PixelMap UNIX picture file PPP Point to Point Protocol PPTP Point to Point Tunneling Protocol PRI Primary Rate Interface PRML Partial Response Maximum Likelihood (hard drive) PRN PRiNter port PS/2 IBM Personal System/2 PSD RGB/indexed PhotoShop image file (Aldus) PSTN Public Switched Telephone Network PVR Personal Video Recorder (TV to digital) Q QBE Query By Example QDR-SDRAM Quad Data Rate Synchronous Dynamic Random Access Memory QEMM Quarterdeck 386 Expanded Memory Manager (QEMM386.SYS) QOS Quality Of Service R RAID Redundant Array of Inexpensive Disks RAM Random Access Memory RAMDAC Random Access Memory Digital to Analog Converter RARP Reverse Address Resolution Protocol RAS (1) Sun Microsystems Raster image file RAS (2) Row Access Strobe RAS (3) Remote Access Service (Microsoft Windows NT/2000) RAVE Rendering Acceleration Virtual Engine (Apple) RAW Unencoded pixel data image file RDF Resource Description Framework (Netscape Aurora) RDRAM Rambus Dynamic Random Access Memory REG REGistry text/ASCII file (Microsoft Windows 9x/NT/2000/Millennium) Registry Microsoft Windows 9x/NT/2000/Millennium Registry database RegEdit Microsoft Windows 9x/NT/2000/Millennium Registry Editor (REGEDIT.EXE) RegEdt32 Microsoft Windows NT/2000 Registry Editor (REGEDT32.EXE) RFC Request for Comments RGB Red Green Blue picture encoding RIMM Rambus Inline Memory Module RISC Reduced Instruction Set Computing (CPU) RIVA Real Time Interactive Video and Animation (nVidia 3D) RLE CompuServe/Microsoft Windows Run Length Encoded graphic file RM386 Helix Software 386 Expanded Memory Manager (RM386.EXE) ROM Read Only Memory RPC Remote Procedure Calls rpm Rotations Per Minute RSA Public Key Encryption algorithms (RSA Data Security) RTC Real Time Clock (BIOS) RTF Rich Text Format (Microsoft Word) RWIN Receive WINdow (Internet protocol) S S3TC S3 Texture Compression architecture (S3 Savage3D/2000) SCSI Small Computers System Interface standard SCSI-1 Small Computers System Interface specifications SCSI-2 Small Computers System Interface specifications SCSI-3 Small Computers System Interface specifications SDK Software Developers Kit SDRAM Synchronous Dynamic Random Access Memory SDS Satellite Data Service SDX Storage Data Acceleration (Western Digital) SECAM SEquential Couleur Avec Mémoire (French TV standard: 819 lines) SECC Single Edge Contact Cartridge (Intel Pentium II CPU) SECC2 Single Edge Contact Cartridge (Intel Pentium III CPU) SEL Software Emulation Layer (Microsoft Direct3D) SEPP Single Edge Processor Package (Intel Celeron CPU) SET Secure Electronic Transaction standard SFN Short File Name (8.3 = MS-DOS 16-bit) SGI Silicon Graphics Incorporated SGML Standard Generalized Markup Language (W3C) SGRAM Synchronous Graphics Random Access Memory SIMD Single Instruction Multiple Data (Intel Pentium MMX) SIMM Single In-line Memory Module SLC Subscriber Line Charge SLDRAM Synchronous Link Dynamic Random Access Memory (Hyundai) SL-DRAM Synchronous Layout Dynamic Random Access Memory (Siemens/Micron) SLI Scan Line Interleave technology (3Dfx Voodoo2) SLIP Serial Line Internet Protocol SLM Spatial Light Modulator SMART Self Monitoring Analysis Reporting Technology standard SMIL Synchronized Multimedia Integration Language (W3C) SMP Symetrical MultiProcessing standard SMPTE Society of Motion Picture and Television Engineers SMTP Simple Mail Transfer Protocol S/NR Signal to Noise Ratio SO-DIMM Small Outline Dual Inline Memory Module connector SPD Serial Presence Detection (EEPROM) S/PDIF Sony/Philips Digital Interchange Format SPI-2 SCSI Parallel Interface standard (SCSI-3) SPI-3 SCSI Parallel Interface standard (SCSI-3) SPP Standard Parallel Port SQL Structured Query Language SRAM Static Random Access Memory sRGB 32-bit standard Red Green Blue color encoding (Microsoft/Hewlett Packard) sRGB64 64-bit standard Red Green Blue double-precision color encoding (Microsoft/Hewlett Packard) SSA Serial Storage Architecture bus/interface SSE Streaming SIMD Extensions (Intel Pentium III Katmai/Coppermine) SSL Secure Sockets Layer SSR Super Scalar Rendering (3D video) STA SCSI Trade Association STD/VR STanDard Voltage Regulator (CPU) STM Scanning Tunneling Microscope SVGA Super Video Graphics Array standard SX X86 Intel CPU without FPU (386/SX, 486/SX) Sync SRAM Synchronous burst Static Random Access Memory (CPU L2 cache) T TAPI Telephony Application Programming Interface TB TeraByte (1 TB = 1024 GigaBytes = 1048576 MegaBytes) T-Buffer Multiple Frame Buffer rendering engine (3Dfx) TCO Total Cost of Ownership TCP Transmission Control Protocol TCP/IP Transmission Control Protocol/Internet Protocol TEC ThermoElectric Cooler (Peltier effect) TELNET A Windows program that allows to to log in remotely (barred by most firewalls) Texel Bilinear TEXtured pixEL (3D video) TFT Thin Film Transistor (active matrix display) TFTP Trivial File Transfer Protocol TGA TrueVision Graphic file (Targa) THD Total Harmonic Distortion THX LucasFilm Home/Cinema Theatre Hi-Fi Dolby Digital Surround audio/video standard (RE: George Lucas' first movie: "THX 1138") TIFF T&L TMM TNT TNT2 TPU TSR TTF TTL TWI Tagged Image File Format (Aldus) Transform & Lighting (3D video) Terabit Molecular Memory technology (Toshiba DVD) TwiN Texel processing engine (nVidia RIVA TNT 2D/3D) TwiN Texel processing engine (nVidia RIVA TNT2 2D/3D) Texture Processing Unit (3Dfx Voodoo/Voodoo2/Voodoo3) Terminate and Stay Resident program/device/driver True Type Font Time To Live (Internet protocol) True Web Integration (Microsoft) U UAE Unrecoverable Application Error UART Universal Asynchronous Receiver Transmitter U-ATA Ultra Advanced Technology Attachment (EIDE drive) UCE Unsolicited Commercial Email UDF Universal Disk Format (Compact Disk) U-DMA Ultra Direct Memory Access (EIDE drive controller) UDP User Datagram Protocol UDSP Uniprocessor Digital Signal Processor Drive Electronics based architecture UHF Ultra High Frequency Ultra160/m SCSI Ultra3 SCSI standard (160 MB/s burst transfer rate) Ultra2b SCSI Ultra2 SCSI standard (80 MB/s burst transfer rate) Ultra DMA Ultra Direct Memory Access (EIDE drive controller) Ultra SCSI Ultra1 SCSI standard (40 MB/s burst transfer rate) UMA Upper Memory Area UMB Upper Memory Block UMR Upper Memory Region UNC Uniform Naming Convention UNIX MultiUser Network Operating System UPS Uninterruptible Power Supply URI Uniform Resource Identifier URL Uniform Resource Locator URM Universal Retention Mechanism (Slot CPU) USB Universal Serial Bus USENET USEr NETwork (newsgroups) USR U S Robotics (3Com modem brand) UUE Uniform Resource Locator UNIX Encoded UUENCODE Unix to Unix Encoding V V.90 ITU PCM 56 Kbps analog modem transfer standard VAR Value Added Reseller VAT Virtual Allocation Table (Compact Disk) VBE VESA BIOS Extensions VBI Vertical Blanking Interval VCP Video Cassette Player VCPI Virtual Control Program Interface VCR Video Cassette Recorder VDSL Variable Digital Subscriber Line modem VESA Video Electronics Standards Association VFAT Virtual File Allocation Table (Microsoft Windows) VFIR Very Fast InfraRed protocol (Hewlett Packard) VfW Video for Windows VGA Video Graphics Array standard VHD Very High Density connector standard (Centronics) VHF Very High Frequency VIS Visual Image Size VLB VESA Local Bus (VL bus) VLM Very Large Memory addressing (Intel Merced) VLSI Very Large Scale Integration VMM (1) Virtual Memory Manager VMM (2) Virtual Machine Monitor VoIP Voice over Internet protocol VPN Virtual Private Network VR (1) Virtual Reality VR (2) Voltage Regulator (CPU) VRE Voltage Regulator Enhanced (MMX CPU) VRAM Video Random Access Memory VRM Voltage Regulator Module VRML Virtual Reality Modeling Language VSA-100 Voodoo Scalable Architecture (3Dfx Napalm 3D chipset) VSM Virtual Storage Management (Microsoft Windows) VXD Virtual eXtended (everything) device Driver (Microsoft Windows) W W3C World Wide Web Consortium WAIS Wide Area Information Server WAN Wide Area Network WAR Wide Aspect Ratio display WBEM Web Based Enterprise Management Initiative WDM Win32 Driver Model WfM Wired for Management WfWG Microsoft Windows for WorkGroups 3.1x Win2000 Microsoft Windows 2000 (formerly NT 5.0) Win2K Microsoft Windows 2K (2000) Win31 Microsoft Windows 3.1x Win32 Microsoft Windows 32-bit OS Win32s Microsoft Windows 32-bit extensions for Windows/WfWG 3.1x 16-bit Win95 Microsoft Windows 95 (4.0x.xxxx) Win98 Microsoft Windows 98 (4.1x.xxxx) WinMill Microsoft Windows Millennium WinNT Microsoft Windows NT 3.xx/4.0x/5.0 (New Technology) WIP Web Interoperability Pledge (ZDNet) WMF Microsoft Windows MetaFile WORM Write Once Read Many (CD-R) WOSA Windows Open Services Architecture WPE Windows Protection Error (Microsoft Windows) WPG WordPerfect Graphic file WRAM Windows Random Access Memory WTX Workstation Advanced Technology EXtended (Intel motherboard form factor) WWIF World Wide InterFace WWW World Wide Web WYSIWYG What You See Is What You Get X x2 3Com/US Robotics 56 kbps analog modem transfer standard X86 Intel X86 CPU (family compatible) X87 Intel X87 FPU (family compatible) XHTML EXtensible Hypertext Markup Language (W3C) XLL EXtensible Link Language (W3C) XML EXtensible Markup Language (W3C) XMM EXtended Memory Manager XMS EXtended Memory Specifications XSL EXtensible Style Language (W3C) XT EXtended Technology (Intel motherboard form factor) XVGA EXtended Video Graphics Array Y ZAK Zero Administration Kit for Windows NT workstations ZAW Zero Administration initiative for Windows Z-buffer Third (3rd) dimension/depth/z axis memory (3D video) ZIF Zero Insertion Force (CPU socket) 286 Intel 80286 processor 2D Two (bi) Dimensional: x and y axes 2K 2000 386 Intel 80386 processor 386MAX Qualitas 386 Expanded Memory Manager (386MAX.SYS) 3D Three (tri) Dimensional: x, y and z axes 3dfx 3d Graphics Interactive (Voodoo family 3D chipsets) 3DNow! AMD K6/K7 CPU multimedia extensions 3DRAM 3D Dynamic Random Access Memory 486 Intel 80486 processor 586 Intel 80586 processor (Pentium/Pentium Pro) 686 Intel 80686 processor (Pentium II/III) 86 Intel 80X86 central processing unit (CPU) 87 Intel 80X87 floating point unit (FPU) Crackers, Phreaks, and Lamers From the early 1980s onward, a flourishing culture of local, MS-DOS-based bulletin boards developed separately from Internet hackerdom The BBS culture has, as its seamy underside, a stratum of `pirate boards' inhabited by crackers, phone phreaks, and warez d00dz These people (mostly teenagers running IBM-PC clones from their bedrooms) have developed their own characteristic jargon, heavily influenced by skateboard lingo and underground-rock slang Though crackers often call themselves `hackers', they aren't (they typically have neither significant programming ability, nor Internet expertise, nor experience with UNIX or other true multi-user systems) Their vocabulary has little overlap with hackerdom's Nevertheless, this lexicon covers much of it so the reader will be able to understand what goes by on bulletin-board systems Here is a brief guide to cracker and warez d00dz usage: Misspell frequently The substitutions phone => fone freak => phreak are obligatory Always substitute `z's for `s's (i.e "codes" -> "codez") The substitution of 'z' for 's' has evolved so that a 'z' is bow systematically put at the end of words to denote an illegal or cracking connection Examples : Appz, passwordz, passez, utilz, MP3z, distroz, pornz, sitez, gamez, crackz, serialz, downloadz, FTPz, etc Type random emphasis characters after a post line (i.e "Hey Dudes!#!$#$!#!$") Use the emphatic `k' prefix ("k-kool", "k-rad", "k-awesome") frequently Abbreviate compulsively ("I got lotsa warez w/ docs") Substitute `0' for `o' ("r0dent", "l0zer") TYPE ALL IN CAPS LOCK, SO IT LOOKS LIKE YOU'RE YELLING ALL THE TIME These traits are similar to those of B1FF, who originated as a parody of naive BBS users; also of his latter-day equivalent Jeff K Occasionally, this sort of distortion may be used as heavy sarcasm by a real hacker, as in: > I got X Windows running under Linux! d00d! u R an 31337 hax0r The only practice resembling this in actual hacker usage is the substitution of a dollar sign of `s' in names of products or service felt to be excessively expensive, e.g Compu$erve, Micro$oft Hacker sites recommended to visit -www.antionline.com www.netcraft.com highy recomended for users who want to break into websites www.hackersclub.com/km www.rootshell.com www.free-ed.net www.hackers2k.bizland.com current under devopment but will be up soon with thousands of tutorials write by my self and by others www.happyhacker.org recommended for newbies,also has links to free shell accounts www.perl.com get the lastest information on perl including downloads for windows www.download.com has lots of networking and programming tools www.whatis.com www.hackernews.com www.ntsecurity.com www.microsoft.com/security www.linuxnewbie.com www.textsfile.com www.packetstorm.securify.com i wont mention any more because when u visit these sites there thousand of more links newsgroups to visit alt.2600.hackerz alt.2600.hackers recommended,currently its probalry the best one out alt.unix alt.security I wont mention any more newsgroups,but u can find lots more by searching!,but i would not recommend going to all those passwords newsgroups as their too much ppl posting shit,even alt.2600 is going down hill because of all the users who post spam,unrelated content,e.t.c alt.2600.hackers takes spammers,and people who post shit very serious,alt.2600.hackers doesnt get much lamers and spammers because of this TCP/IP UTTILITES CONNECTIVITY TOOLS >IPCONFIG:a program that dispays tcp/ip settings >PING:a program that tests for network connectivity >ARP:an uttility that dispays the arp cache of a local or remote computer >TRACERT OR TRACEROUTE:a program that traces the path of a datagram through the internetwork >ROUTE:a program that lets you add or remove enteries in a routing table >NETSTAT:a program that displays IP,UDP,TCP, and ICMP staticts >NBTSTAT:a program which displays netbios and nbt stats FILE TRANSFERE UTILITIES ->FTP:a basic file tranfere uttility that uses tcp >TFTP:a file transfere uttility which uses UDP >RCP:a remote file transfere program REMOTE UTILITIES ->TELNET:A remote terminal program >REXEC:a unix program that runs commands on a remote computer through the rexecd daemon >RSH: program tht involkes the shell on a remote computer to execute a command >FINGER:a program which displays user information INTERNET TOOLS ->BROWSERS:provide acces too www html content >NEWSREADERS:program which connect with newsgroups >EMAIL READERS:program for sending and recieving emails >ARCHIE:internet program for fiding access to anonymous ftp sites, >GOPHER:menu based internet information >WHOIS:Provides information on www sites and ip addresses NOTE:these are basic program ,theres thousands more like dig,pc anywhere,ssh,dhcp,e.t.c TOP 20 REASONS FOR BREAKINGS INTO WINDOWS AND UNIX -1.Un needed services 2.Misconfiggured firewalls! 3.File and printer sharing! 4.Hackers tunneling though from ftp and telnet 5.On windows script kiddies often send trojans! 6.Exploits! 7.Sniffing attacks 8.Buggy software! 9.Miconfigguered servers 10.Allowing root remotly with no encryption 11.brute force 12.Weak passwords 13.Users with no firewalls 14.Remote admin Trojans 15.Using adsl with no hacker protechtion 16.Allowing user access to /etc/passwd 17.Allowing anonymous access to servers 18.Open ports 19.Not using tcp logging 20.Using out of date softwere TOP 10 THINGS FOR NEWBIE HACKERS TO LEARN -1.How to use windows comprehensivly 2.Some short programming knowledge in c or basic,e.t.c 3.MS dos knowledge 4.Networking knowlege like tcp/ip 5.Unix and linux knowlege 6.Some scripting knowledge like html,perl or batch programming 7.Computer security tools like firewalls 8.Hacking techniques 9.Web browsers,ftp clients,irc clients,servers,e.t.c are good to very worth learning 10.Hiding their ip address These can usally be learned eaisly in months and upwards,once u learn these stuff everything else becomes easily to learn TOP 10 STUFF NOT WORTH LEARNING FOR NEWBIE HACKERS IN UNDERGROUND SITES 1.PHREAKING .usally the guides are out of date and useless 2.Cracking 3.Old hacking guides older than 10 years old 4.Low level programming .although as u become a hacker or good programmer you will need to learn it 5.machine language .absoultly not worth learning as it can take years and it's far to slow 6.Bomb making 7.Lanaguages like forth,and fortran well learn them if you want but in a few years they will be almost never be used as much as languages like c,python,c++,c#,and visual basic 8.Visual Basic .its currently hated amongst the hacker community but learn it if you want to although it can teach newbie programmer very bad techniques and habbits new note:visual basic isnt as bad as described ,it can be quite useful and easy 9.Credit card fraud 10.DoSing This guide is in its beta version,as the author i hope u like it,send feedback to kev_harrasment_panda@yahoo.co.uk your sincealry shady_harrasment_panda [...]... programmers and hackers because of its security features and of its open source.Hackers usally use linux because it supports all the major programming languages and because it has more power in networking than its rival o/s windows >LOCAL:is a computer which is in the same building as the other computers on a network,local hackers are hackers within the same network,remote hackers are hackers who hack... and not locked into a terminal,webservers are ferffered to httpd as the server sits in the background and does need watched >DARK SIDE -HACKER: A criminal or malicious hacker known as a cracker who thinks hes a hacker but techinally speaking hes a script kiddie who gets hackers a bad name >DATA ENCRYPTION STANDARD:an government specification for encoding files by using a password.its supposed to be uncrakble... cash and studies network security and hacking! >HACK:a hack is a sucessfull piece of code which has been changed or it can be when a hacker sucessfully hacks a system througn an exploit or using BF, e.t.c >HACKER: are the dudes who make the internet what it is,most of the hackers program and contrinute to the linux world and most of them like to study network security and breaking into systems >HANG UP:used... TALK:the connecters and cables which make up the apple talk network >LoD (Legion of Doom):Legendary hacker group of the 90's >.LOG:is a file which records every ip address which connects to a system and can record the presence of hackers in a system,logs are usally write protected and are the main cause of newbie hackers getting traced >LOG IN:to gain access to a computer by giving the correct id and password... alternitive to ethernet >TOKEN PASSING.the network access layer used by the token ring network >TOOLS:is the tools which help hackers and admins out like nmap,tcpdumb,queso,john the ripper,telnet,e.t.c >TRACING:is to trace the source ip address of a hacker or cracker,admins usally trace hackers by looking in the log files or by monitering tools,once an admin get the ip address of the attacker(which isnt always... >NOS(network o/s system):is the softwere which control the network which an e.g of a nos is windows nt >NEWBIES:is a person who is new to usenet or hacking,newbies make up the large part of hackers and it is the newbie hackers who tend to get cought more easily,newbies often have it easy now a days as theres thousands of hacking programs and tutorials freely avalible on the net.! >.NEWSGROUP:is a descussion... pop which sends emails and recieves them unlike stmp which can only send mail.>hotmail.com is an example of pop email client >PORT:can be 3 things but in hacker terms it is a open target in form as a open service such as 139,telnet,21 which means the hacker can try and exploit them to gain root or get access to windows 98 e.t.c >PORTSCAN:is to scan a computer for open ports,many ppl have different thoughts... that it legal.A port scan is the first thing a hacker would do on his target system >POSTSCRIPT: a page scripting language devloped by adobe system >PPPT(point to point tunelling)a form of ppp which enebles information to be migled with a local area network >PRINT SERVICE:a service that fulfills network requests to print doc's >PROGRAMMER:is usally a skilled hacker or individual who has the abuity to... particular information,a hacker usally is interested in the whois query >QUESO:is a remote fingerprinting uttility for determing an computer o/s >RAS(remote access server):is a dial up server which comes free with win nt and win 2000 >RCP:a remote file transfere utiility >READ-ONLY:is a type of storage or file which u can read but not change.Usually read only log files are the cause for hacker getting traced,although... user on a unix network who can do anything he wants like change users password,delete data,use every command and so on.Root is also refered to as su(super user),a hacker main objetive is to gain root on his target network.When a cracker or hacker get root on a large web host provider it is possible for him to change every users web page in seconds by uploading an script and executing it to change the

Ngày đăng: 30/10/2015, 17:40

Xem thêm: Hacker Dictionary Guide

TỪ KHÓA LIÊN QUAN

w