Organized violence against Jews.

Posts made by Agnes
-
RE: Harvester
An automatic web site scanning application that methodically scearches through internet sites for viable email addresses. The primary source of SPAM generation.
-
RE: Yucker
A stone, rock or brick that is quite big but small enough to throw. Its the throwing aspect that turns it from an inanimate object into a yucker.
-
RE: Prayer
The arrogant belief that Gods plans are so unimportant, he will change them just for you.
-
RE: Icelandic
The language [Icelandic] people speak.
The Icelandic alphabet:
A [Á] B D [Ð] E [É] F G H I Í J K L M N O [Ó] P R S T U [Ú] V Y [Ý] [Þ] [Æ] [Ö]
a á b d ð e é f g h i í j k l m n o ó p r s t u ú v y ý þ æ ö
An example of Icelandic:
Heyrðu, kemur þú í myndbandaleiguna á eftir, en ekki fyrr en klukkan fjögur vegna þess að ég er að fara í afmæli til ömmu minnar.
Translated:
Hey, are you coming to the video rental store later, but not until 4 oclock because Im going to my grandmothers birthday.
Another example:
Hvað gerðir þú um helgina?
Ég heimsótti systur mína og við horfðum á kvikmyndir til klukkan fimm um nótt.
translated:
What did you do this weekend?
I visited my sister and we watched movies to five oclock.
I know its stupid but it contains words that people often use in Iceland.
Another example:
Ég hata Jónu, hún sagði að ég væri tík og hóra!
Ég vona að hún fari til helvítis.
Translated:
I hate Joanne, she said that I was a bitch and a whore!
I hope she goes to hell.
Another example:
Sonur sæll, þegar þú ferð til ömmu þá segirðu Góðan dag amma mín, en hvað þú ert falleg.
Svo verðurðu kurteis við hana vegna þess að hún býr ein heima hjá sér.
Translated:
Son, when you go to grannys you say Good day grandma, you look beautiful today.
Then you will be nice to her because she lives alone.
Iceland is the small island east of Greenland and west of Norway in the upper-middle of the Antlantic-Ocean.
Its a part of Europe although its half in its still considered as being part of Europe. -
RE: Misfits
The best band ever, started be Jerry only and glenn danzig. everything they sing is great.
-
ZIF
Stands for Zero Insertion Force. ZIF is a type of CPU socket on a computer motherboard that allows for the simple replacement or upgrade of the processor. Processors that use a ZIF socket can easily be removed by pulling a small release lever next to the processor and lifting it out. The replacement processor is then placed in the socket and secured by pushing the lever in the opposite direction -- hence the phrase, zero insertion force. I suppose there is some force required to push the lever, but it is significantly less than non-ZIF sockets, which require special tools to force the processor out.
-
Web 2.0
Web 2.0 is term that was introduced in 2004 and refers to the second generation of the World Wide Web. The term 2.0 comes from the software industry, where new versions of software programs are labeled with an incremental version number. Like software, the new generation of the Web includes new features and functionality that was not available in the past. However, Web 2.0 does not refer to a specific version of the Web, but rather a series of technological improvements.
Some examples of features considered to be part of Web 2.0 are listed below:
Web 2.0 technologies provide a level user interaction that was not available before. Websites have become much more dynamic and interconnected, producing online communities and making it even easier to share information on the Web. Because most Web 2.0 features are offered as free services, sites like Wikipedia and Facebook have grown at amazingly fast rates. As the sites continue to grow, more features are added, building off the technologies in place. So, while Web 2.0 may be a static label given to the new era of the Web, the actual technology continues to evolve and change. -
Username
A username is a name that uniquely identifies someone on a computer system. For example, a computer may be setup with multiple accounts, with different usernames for each account. Many websites allow users to choose a username so that they can customize their settings or set up an online account. For example, your bank may allow you to choose a username for accessing your banking information. You may need to choose a username in order to post messages to a certain message board on the Web. E-mail services, such as Hotmail require users to choose a username in order to use the service.
A username is almost always paired with a password. This username/password combination is referred to as a login, and is often required for users to log in to websites. For example, to access your e-mail via the Web, you are required to enter your username and password. Once you have logged in, your username may appear on the screen, but your password is kept secret. By keeping their password private, people can create secure accounts for various websites. Most usernames can contain letters and numbers, but no spaces. When you choose a username for an e-mail account, the part before the @ is your username. -
Touchscreen
A touchscreen is a display that also serves as an input device. Some touchscreens require a proprietary pen for input, though most modern touchscreens detect human touch. Since touchscreen devices accept input directly through the screen, they do not require external input devices, such as mice and keyboards. This makes touchscreens ideal for computer kiosks, as well as portable devices, such as tablets and smartphones.
While a touchscreen may look like an ordinary display, the screen includes several extra layers that detect input. The first layer is a hard protective layer that protects the actual display and the touchscreen components. Beneath the protective layer is an electronic grid that detects input. Most modern touchscreens use capacitive material for this grid, in which the electrical charge changes wherever the screen is touched. Beneath the touchscreen layer is the LCD layer, which is used for the actual display.
While early touchscreens could only detect a single point of input at a time, modern touchscreens support multi-touch input. This technology, which was made popular by the original iPhone, enables the screen to detect multiple finger motions at once. For example, on some touchscreen devices, you can rotate an image by twisting three fingers in a clockwise or counterclockwise motion. Many touchscreen applications also allow you zoom in and out by spreading two fingers apart or pinching them together.
Thanks to multi-touch and other improvements in touchscreen technology, todays touchscreens are easier and more natural to use than they used to be. In fact, improved touchscreen technology has greatly contributed to the popularity of the iPad and other tablet PCs. -
Spooling
Spooling is the process of a sending data to a spool, or temporary storage area in the computers memory. This data may contain files or processes. Like a spool of thread, the data can build up within the spool as multiple files or jobs are sent to it. However, unlike a spool of thread, the first jobs sent to the spool are the first ones to be processed (FIFO, not LIFO).
The most common type of spooling is print spooling, where print jobs are sent to a print spool before being transmitted to the printer. For example, when you print a document from within an application, the document data is spooled to a temporary storage area while the printer warms up. As soon as the printer is ready to print the document, the data is sent from the spool to the printer and the document is printed.
Print spooling gets its name from technology used in the 1960s, when print jobs were stored on large reels of magnetic tape. The data from these reels was physically spooled to electrostatic printers, which printed the output saved to the tape. -
RE: Stewed
A far cooler alternative to [owned], [pwned], or [served] that generally means you were dissed. Most effective following a bad your mom joke.
-
Shareware
Shareware is software that you can use on a trial basis before paying for it. Unlike freeware, shareware often has limited functionality or may only be used for a limited time before requiring payment and registration. Once you pay for a shareware program, the program is fully functional and the time limit is removed.
In the 1980s and 1990s, shareware was a popular way for small developers to distribute software. The advent of CDs allowed multiple developers to deliver their software programs as a collection, such as Top 100 Mac Games. Other shareware collections included utilities, graphics programs, and productivity applications. In many cases, these programs were fully functional and simply requested a donation from users. Programs that incessantly reminded users to register and pay for the software became known as nagware.
Today, the most common type of shareware programs are trial programs, which are also called trialware or demoware. These programs are provided as demos that you can try for a limited time, such as two weeks or one month. Once the trial period expires, you must pay for the software in order to continue using it. Most shareware demos can be downloaded directly from the software publishers website. -
Sandboxing
Sandboxing is a software management strategy that isolates applications from critical system resources and other programs. It provides an extra layer of security that prevents malware or harmful applications from negatively affecting your system.
Without sandboxing, an application may have unrestricted access to all system resources and user data on a computer. A sandboxed app on the other hand, can only access resources in its own sandbox. An applications sandbox is a limited area of storage space and memory that contains the only resources the program requires. If a program needs to access resources or files outside the sandbox, permission must be explicitly granted by the system.
For example, when a sandboxed app is installed in OS X, a specific directory is created for that applications sandbox. The app is given unlimited read and write access to the sandboxed directory, but it is not allowed to read or write any other files on the computers storage device unless it is authorized by the system. This access is commonly granted using the Open or Save dialog box, both of which require direct user input.
While sandboxing provides added security for users, it can also limit the capabilities of an application. For example, a sandboxed app may not allow command line input since the commands are run at a system level. Utilities such as backup programs and keyboard shortcut managers may not be granted sufficient permissions to function correctly. For this reason, some programs cannot be sandboxed.
NOTE: OS X has supported sandboxing since OS X Lion, which was released in 2011. The Mac App Store has required apps to be sandboxed since March 2012. Windows does not natively provide app sandboxing, but some apps (such as Microsoft Office programs) can be run in a sandboxed mode. Additionally, several Windows utilities allow you to run apps in a sandbox, preventing them from affecting the system or other applications. -
null
The ribbon is a user interface element created by Microsoft, which was introduced with Microsoft Office 2007. It is part of the Microsoft Office Fluent interface and combines the menu bar and toolbar into a single floating pane. By default, the ribbon is located at the top of the screen in Office applications, such as Access, Excel, PowerPoint, Word, and Outlook.
The purpose of the ribbon is to provide quick access to commonly used tasks within each program. Therefore, the ribbon is customized for each application and contains commands specific to the program. Additionally, the top of the ribbon includes several tabs that are used to reveal different groups of commands. For example, the Microsoft Word ribbon includes Home, Insert, Page Layout, References, and other tabs that each display a different set of commands when selected.
Since the ribbon contains both the programs menu options and toolbar commands, it cannot be removed from the screen. However, it can be minimized to free up more screen real estate for the primary document window. To minimize the ribbon, you can either click the upside down eject icon at the top of the ribbon or use the keyboard shortcut Control F1. Once the ribbon has been minimized, it can be restored by clicking the same icon or using the same keyboard shortcut.
The ribbon is the primary user interface (UI) element in both Office 2007 and Office 2010. Office 2011 for Mac includes also includes the ribbon, but has a slightly different layout. Additionally, other software companies can license the Microsoft Office UI, allowing them to include a custom ribbon in their programs. For example, Autodesk AutoCAD 2009 and later includes the ribbon at the top of the primary program window. -
Raster Graphic
Most images you see on your computer screen are raster graphics. Pictures found on the Web and photos you import from your digital camera are raster graphics. They are made up of grid of pixels, commonly referred to as a bitmap. The larger the image, the more disk space the image file will take up. For example, a 640 x 480 image requires information to be stored for 307,200 pixels, while a 3072 x 2048 image (from a 6.3 Megapixel digital camera) needs to store information for a whopping 6,291,456 pixels.
Since raster graphics need to store so much information, large bitmaps require large file sizes. Fortunately, there are several image compression algorithms that have been developed to help reduce these file sizes. JPEG and GIF are the most common compressed image formats on the Web, but several other types of image compression are available.
Raster graphics can typically be scaled down with no loss of quality, but enlarging a bitmap image causes it to look blocky and pixelated. For this reason, vector graphics are often used for certain images, such as company logos, which need to be scaled to different sizes.
File extensions: .BMP, .TIF, .GIF, .JPG