Verb:To get your Steam,World of Warcraft,Runescape,Myspace,Facebook or even email hijacked by giving a password away during chatting or even in an email
Posts made by Ernesto
-
RE: Lamed
-
FiOS
Stands for Fiber Optic Service. FiOS is a data communications service provided by Verizon that uses fiber optic cables to transfer data. FiOS is called a Fiber to the Premises, or FTTP service, since it brings fiber optic data transmission to residential homes as well as businesses. Since fiber optic technology sends data via pulses of light, it is the fastest method of transferring data.
While FiOS is currently used primarily for Internet access, it can also be used for digital cable and voice over IP (VoIP) services. For this reason, FiOS is considered to be a potential competitor to both cable and Internet Service Providers. -
File Extension
A file extension (or simply extension) is the suffix at the end of a filename that indicates what type of file it is. For example, in the filename myreport.txt, the .TXT is the file extension. It indicates the file is a text document. Some other examples include .DOCX, which is used for Microsoft Word documents, and .PSD, which is the standard file extension for Photoshop documents.
While most file extensions are three characters in length, they can be as short as one character or longer than twenty characters. Sometimes long file extensions are used to more clearly identify the file type. For example, the .TAX2015 file extension is used to identify TurboTax 2015 tax returns and the .DESKTHEMEPACK extension identifies Windows 8 desktop themes. The file extension determines which program is used to open the file as well as what icon should be displayed for the file. It also helps you see what kind of file a certain document is by just looking at the filename.
Both Windows and Mac OS X allow you to manually change file extensions, which may also change the program the computer uses to open the file. While this might work for some files, it may also cause the file to not open at all. For example, if you change a file with a .txt extension to a .doc extension, Microsoft Word may still open it. However, if you change a .txt file to a .psd file, Photoshop will not recognize or open the file.
Since there are tens of thousands of file types, there are also tens of thousands of file extensions. While it may not be possible to remember all of them, it is helpful to learn some of the more common ones, such as .JPG, .GIF, .MP3, .ZIP, .HTML, and others. For a list of common file extensions and their associated file types, visit FileInfo.coms Common File Types page. -
Email
Email, short for electronic mail, is one of the most widely used features of the Internet, along with the web. It allows you to send and receive messages to and from anyone with an email address, anywhere in the world.
Email uses multiple protocols within the TCP/IP suite. For example, SMTP is used to send messages, while the POP or IMAP protocols are used to retrieve messages from a mail server. When you configure an email account, you must define your email address, password, and the mail servers used to send and receive messages. Fortunately, most webmail services configure your account automatically, so you only need to enter your email address and password. However, if you use an email client like Microsoft Outlook or Apple Mail, you may need to manually configure each account. Besides the email address and password, you may also have to enter the incoming and outgoing mail servers and enter the correct port numbers for each one.
The original email standard only supported plain text messages. Eventually, email evolved to support rich text with custom formatting. Today, email supports HTML, which allows emails to be formatted the same way as websites. HTML email messages can include images, links, and CSS layouts. You can also send files or email attachments along with messages. Most mail servers allow you to send multiple attachments with each message, but they limit the total size. In the early days of email, attachments were typically limited to one megabyte, but now many mail servers support email attachments that are 20 megabytes in size or more.
When composing an email message, it is important to use good netiquette. For example, you should always include a subject that summarizes the topic of the email. It is also helpful to begin each message with the recipients name and end the message with your name or signature. A typical signature includes your name, email address, and/or website URL. A professional signature may include your company name and title as well. Most email programs allow you to save multiple signatures, which you can insert at the bottom of an email.
If you want to send an email to multiple recipients, you can simply add each email address to the To field. However, if the email is primarily intended for one person, you should place the additional addresses in the CC (carbon copy) field. If you are sending an email to multiple people that dont know each other, it is best to use the Bcc (blind carbon copy) field. This hides the email addresses of each recipient, which helps prevent spam.
NOTE: Email was originally written e-mail, but is now more commonly written as email without the dash. -
RE: Partial
When someone is able to take their teeth out in order to give fellatio.
-
RE: Scape
To turn someone on to the TV series Farscape, an activity carried out by [Scapers].
-
RE: Cryptography
Cryptography is the science of protecting information by transforming it into a secure format. This process, called encryption, has been used for centuries to prevent handwritten messages from being read by unintended recipients. Today, cryptography is used to protect digital data. It is a division of computer science that focuses on transforming data into formats that cannot be recognized by unauthorized users.
An example of basic cryptography is a encrypted message in which letters are replaced with other characters. To decode the encrypted contents, you would need a grid or table that defines how the letters are transposed. For example, the translation grid below could be used to decode 1234125678906 as techterms.com.
The above table is also called a cipher. Ciphers can be simple translation codes, such as the example above, or complex algorithms. While simple codes sufficed for encoding handwritten notes, computers can easily break, or figure out, these types of codes. Because computers can process billions of calculations per second, they can even break complex algorithms in a matter of seconds. Therefore, modern cryptography involves developing encryption methods that are difficult for even supercomputers to break. -
CRT
Stands for Cathode Ray Tube. CRT is the technology used in traditional computer monitors and televisions. The image on a CRT display is created by firing electrons from the back of the tube to phosphors located towards the front of the display. Once the electrons hit the phosphors, they light up and are projected on the screen. The color you see on the screen is produced by a blend of red, blue, and green light, often referred to as RGB.
The stream of electrons is guiding by magnetic charges, which is why you may get interference with unshielded speakers or other magnetic devices that are placed close to a CRT monitor. Flat screen or LCD displays dont have this problem, since they dont require a magnetic charge. LCD monitors also dont use a tube, which is what enables them to be much thinner than CRT monitors. While CRT displays are still used by graphics professionals because of their vibrant and accurate color, LCD displays now nearly match the quality of CRT monitors. Therefore, flat screen displays are well on their way to replacing CRT monitors in both the consumer and professional markets. -
CPM
Stands for Cost Per 1,000 Impressions, and is used in online advertising. CPM defines the cost an advertiser pays for 1,000 impressions of an advertisement, such as a banner ad or other promotion. An impression is counted each time an advertisement is shown.
While some advertisers pay publishers an amount based strictly on impressions, most advertisers pay for individual clicks or leads generated from their advertisements. Therefore, in Web advertising, it may be more effective to measure pay per click (PPC) or pay per lead (PPL) rates. Either way, the advertisers goal is to generate as many leads as possible by keeping the rates as low as possible.
Web publishers also use the CPM to measure the revenue per 1,000 impressions. While technically this should be revenue per 1,000 impressions, or RPM, the terms CPM and RPM are often used interchangeably from the publishers perspective. -
Cold Boot
To perform a cold boot (also called a hard boot) means to start up a computer that is turned off. It is often used in contrast to a warm boot, which refers to restarting a computer once it has been turned on. A cold boot is typically performed by pressing the power button on the computer.
Both a cold boot and warm boot clear the system RAM and perform the boot sequence from scratch. However, unlike a cold boot, a warm boot may not clear all system caches, which store temporary information. Additionally, a cold boot performs a power on self test (POST), which runs a series of system checks at the beginning of the boot sequence.
While a warm boot and cold boot are similar, a cold boot performs a more complete reset of the system than a warm boot. Therefore, if you are troubleshooting your computer, you may be asked to turn off your computer completely and perform a cold boot. This makes sure all temporary data is wiped from your system, which may help eliminate issues affecting your computer. -
Clipboard
The clipboard is a section of RAM where your computer stores copied data. This can be a selection of text, an image, a file, or other type of data. It is placed in the clipboard whenever you use the Copy command, which is located in the Edit menu of most programs.
Data from the clipboard can be pasted into a document or program using the Paste command, which is also located in most programs Edit menu. For example, an image copied to the clipboard from your photo album may be pasted into an image editing program such as Photoshop. A Web address can be copied to the clipboard from an e-mail and pasted into your Web browsers address field.
Some programs allow you to see what data is stored in the clipboard. For example, the Finder in Mac OS X allows you to choose Show Clipboard from the Edit menu. When you copy data to the clipboard, whatever data was already stored in the clipboard is typically replaced by the new data. Because the clipboard data is stored in RAM, it is also deleted when your computer is shut down or restarted. -
Character Encoding
While we view text documents as lines of text, computers actually see them as binary data, or a series of ones and zeros. Therefore, the characters within a text document must be represented by numeric codes. In order to accomplish this, the text is saved using one of several types of character encoding.
The most popular types of character encoding are ASCII and Unicode. While ASCII is still supported by nearly all text editors, Unicode is more commonly used because it supports a larger character set. Unicode is often defined as UTF-8, UTF-16, or UTF-32, which refer to different Unicode standards. UTF stands for Unicode Transformation Format and the number indicates the number of bits used to represent each character. From the early days of computing, characters have been represented by at least one byte (8 bits), which is why the different Unicode standards save characters in multiples of 8 bits.
While ASCII and Unicode are the most common types of character encoding, other encoding standards may also be used to encode text files. For example, several types of language-specific character encoding standards exist, such as Western, Latin-US, Japanese, Korean, and Chinese. While Western languages use similar characters, Eastern languages require a completely different character set. Therefore, a Latin encoding would not support the symbols needed to represent a text string in Chinese. Fortunately, modern standards such as UTF-16 support a large enough character set to represent both Western and Eastern letters and symbols. -
Shanties
Shanties:
n. Article of clothing short enough to be mistaken as panties, but worn as shorts.
-
C#
C# (pronounced C Sharp) is a programming language developed by Microsoft. It was introduced in 2002 with version 1.0 of Microsofts .NET Framework. Since then, C# has gone through several revisions, corresponding with each .NET update. Today, it is one of the most popular programming languages for creating Windows programs and web applications.
C# is a derivative of the C programming language and is similar to C . It uses the same basic operators as C , is object oriented, case sensitive, and has nearly identical syntax. However, there are several differences between C# and C . Below are just a few examples:
Most importantly, C# is designed specifically for Microsofts .NET Framework. This allows developers to take advantage of all the features offered by the .NET API. However, it also means C# applications can only run on platforms that support .NET runtime, such as Windows, Windows Server, and Windows Phone. In order for programs written in C# to run on other platforms, the code must be compiled using a conversion tool like Microsoft .NET Native.
NOTE: The name C# comes from the musical note C♯, implying it is a step up from the original version of C. The ♯ symbol is also comprised of four plus signs, which may imply C# is more advanced than C as well.
-
Brownfield
Brownfield is a construction term that describes previously developed land. In the IT industry, it refers to previously developed software. Brownfield software development is software that is built from an existing program. It may be contrasted with greenfield development, which involves creating a software program from scratch.
Since the software industry has been around for several decades, the vast majority of software development is brownfield. For example, each new version of Adobe Photoshop and Microsoft Word is developed as a brownfield project. Even modern video games, such as Call of Duty: Black Ops 3 and StarCraft 2, are created from earlier versions of the software.
Brownfield software development has many advantages over greenfield projects. For instance, whenever a software company releases an update to a program, they have a good idea of the market for the software. They also know what features and style of interface their users expect. Adding new features and interface enhancements is less time consuming than developing a program from scratch. Therefore, brownfield development is less costly and involves less risk than greenfield development. -
Bitcoin
Bitcoin is a digital currency that was introduced in 2009. There is no physical version of the currency, so all Bitcoin transactions take place over the Internet. Unlike traditional currencies, Bitcoin is decentralized, meaning it is not controlled by a single bank or government. Instead, Bitcoin uses a peer-to-peer (P2P) payment network made up of users with Bitcoin accounts.
Bitcoins can be acquired using two different methods: 1) exchanging other currencies for bitcoins, and 2) bitcoin mining. The first method is by far the most common and can be done using a Bitcoin exchange like Mt. Gox or CampBX. These exchanges allow users to trade dollars, euros, or other currencies for bitcoins.
The other method, bitcoin mining, involves setting up a computer system to solve math problems generated by the Bitcoin network. As a bitcoin miner solves these complex problems, bitcoins are credited to the miner. While this seems like an easy way to earn bitcoins, the Bitcoin network is designed to generate increasingly more difficult math problems, which ensures new bitcoins will be generated at a consistent rate. Additionally, the Bitcoin protocol and software are open source to make sure the network isnt controlled by a single person or entity.
When you obtain bitcoins, your balance is stored in a secure “wallet” that is encrypted using password protection. When you perform a bitcoin transaction, the ownership of the bitcoins is updated in the network and the balance in your wallet is updated accordingly. Bitcoin transactions are verified by the bitcoin mining systems connected to the network, so there is no need for a central bank to authorize transactions.
Since bitcoins are transferred directly from person to person, the transaction fees are small (around sh.01 per transaction). Additionally, there are no prerequisites for creating a Bitcoin account and no transaction limits. Bitcoins can be used around the world, but the currency is only good for purchasing items from vendors that accept Bitcoin. -
AUP
Stands for Acceptable Use Policy. An AUP is list of rules you must follow in order to use a website or Internet service. It is similar to a software license agreement (SLA), but is used specifically for Internet services.
Most well-known, high traffic websites include an AUP, which may also be called Terms of Service (TOS) or Terms of Use (TOU). You can often find a link to the to the websites AUP in the footer of the home page. Many web services, such as cloud applications require you to agree to an AUP in order to use the online service. ISPs often provide an AUP with each account, which states specific guidelines you must follow.
The specifics of an AUP vary depending on the service offered. Even website AUPs may differ greatly based on the purpose of the website and the websites content. However, most AUPs include a list of general dos and donts while using the service, such as the following:
An AUP serves as an agreement between the user and the company offering the online service. Some rules are basic netiquette, while others may have legal ramifications. If you fail to comply with a policy in a AUP, the company has the right to suspend or terminate your account or take legal action if necessary. Therefore, it is wise to familiarize yourself with the AUPs of the Internet services you use. -
ATM
Stands for Asynchronous Transfer Mode. Most people know of ATMs as automated teller machines -- those friendly boxes that allow you to withdraw cash from your bank or credit account while charging you a ridiculous surcharge for the service. In the computer world, however, ATM has a different meaning. Asynchronous Transfer Mode is a networking technology that transfers data in packets or cells of a fixed size.
ATM uses 53-byte cells (5 bytes for the address header and 48 bytes for the data). These extremely small cells can be processed through an ATM switch (not an automated teller machine) fast enough to maintain data transfer speeds of over 600 mbps. The technology was designed for the high-speed transmission of all forms of media from basic graphics to full-motion video. Because the cells are so small, ATM equipment can transmit large amounts of data over a single connection while ensuring that no single transmission takes up all the bandwidth. It also allows Internet Service Providers (ISPs) to assign limited bandwidth to each customer. While this may seem like a downside for the customer, it actually improves the efficiency of the ISPs Internet connection, causing the overall speed of the connection to be faster for everybody. -
Alert Box
An alert box, sometimes called a message box, is a small window that pops up on your screen to warn you that your computer is about to perform an operation with potentially damaging consequences. For example, when you choose to empty the Trash or Recycle Bin on your computer, an alert box may pop up, saying Are you sure you want to permanently remove these items? You are then given the choice to select OK, to delete the items, or Cancel, to prevent the items from being removed.
Alert boxes act as a safeguard for users, preventing us from doing things we wish we hadnt. Perhaps the most common alert box is the one that pops up when you try to close a document without saving it. Youll mostly likely see an alert box with the message, Save changes to this document before closing? You can select Dont Save, to discard the changes, Save, to save the changes before closing the document, or Cancel, to cancel closing the document and continue working on it.
Most alert boxes include the standard alert icon -- a triangle with an exclamation point in the middle -- to get your attention. However, not all alert boxes have multiple options, such as Cancel and OK. For example, an alert box may show up on your screen saying a program performed an illegal operation and has unexpectedly quit. When that happens, your only option is to select OK and then kick your computer for quitting the program before you had a chance to save your work.