Stands for Secure Shell. SSH is a method of securely communicating with another computer. The secure part of the name means that all data sent via an SSH connection is encrypted. This means if a third party tries to intercept the information being transferred, it would appear scrambled and unreadable. The shell part of the name means SSH is based on a Unix shell, which is a program that interprets commands entered by a user.
Because SSH is based on a Unix shell, standard Unix commands can be used to view, modify, and transfer files from a remote machine once an SSH connection has been established. These commands can either be entered manually using a terminal emulator, or may be sent from a program with a graphical user interface (GUI). This type of program translates user actions, such as opening a folder, to Unix commands (cd [folder name]).
To log into a server using SSH from a terminal program, type: ssh [servername] -l [username].
The -l indicates you are logging in with a username, which is required by most SSH connections (otherwise, it wouldnt be very secure). If the login name is recognized, you will be prompted to enter a password. If the password is correct, your SSH connection will be established. To end the SSH session, type exit followed by the Enter key.

Posts made by Kit
-
SSH
-
SO-DIMM
Stands for Small Outline Dual In-Line Memory Module. Most desktop computers have plenty of space for RAM chips, so the size of the memory modules is not a concern. However, with laptops, the size of the memory modules matters significantly. Because laptops are designed to be as small and as light as possible, the size of each component matters. In fact, laptop parts are so crammed together, large RAM chips often do not fit into the overall laptop design. This is why SO-DIMMs were created.
A SO-DIMM is about half the length of a regular size DIMM. This allows greater flexibility in designing the memory slots for laptops. Many laptops have a user-accessible section that houses the SO-DIMMs, which make it easy to upgrade the computers RAM. If the RAM chips were full size DIMMs, this type of design would be harder to incorporate and would likely increase the size of the laptop.
The first SO-DIMMs used 72 pins (or connectors) and supported 32-bit data transfers. Modern SO-DIMMs, however, typically use 144 pins, which allows for the same 64-bit transfers that a regular size DIMM does. While SO-DIMMs are used primarily in laptops, some desktop computers with small form factors also use SO-DIMMs to reduce the overall size of the case. However, when size is not an issue, regular DIMMs are typically used because they are a more cost-effective solution. -
RE: Cressida
A marketing phenomena first made popular in the mid 80s. originally introduced by toyota and intended to outlast the camry, americas number 1 selling sedan, the cressida ultimately failed in such an endeavor and was discontinued sometime in the early 90s. a super-modified automobile, the cressida comes to most represent the toyota avalon, a luxory version of the camry. backed by a large amount of genius, the cressida was ultimately equipped as both a high performance and luxory vehicle.
boasting a 190hp twincam engine, highly resembling that of the toyota supra, this rear-wheel car took the nation by storm and can be seen around the nation by young drifters in their early 20s. -
RE: Marzipan
- A sweet confection that mostly comes with cakes and other such pastries, made of almonds, egg whites, sugar and sometimes chocolate, often molded into decorative shapes.
- A standalone female character of the animated series [Homestar Runner] who resembles a finger with a face painted on it, or an earthworm with a blonde ponytail.
-
RPC
Stands for Remote Procedure Call. Most computer programs run procedures, or sets of instructions, using the computers CPU. In other words, the instructions are processed locally on the same computer that the software is running from. Remote procedure calls, however, run procedures on other machines or devices connected to a network. Once the instructions have been run, the results of the procedure are usually returned to the local computer.
For example, a computer without a hard drive may use an RPC to access data from a network file system (NFS). When printing to a network printer, a computer might use an RPC to tell the printer what documents to print. A client system connected to a database server may execute an RPC to process data on the server.
Remote procedure calls are based on the client-server model, where multiple client computers may connect to a server and retrieve data from it. RPCs are typically written in a standard format, such as XML, so that the procedures can be understood by multiple computer platforms. For example, an XML-RPC sent by a Windows computer could be recognized by a Macintosh or Unix-based system. -
Retina Display
The term retina display is a hardware term coined by Apple in June, 2010. It describes a display that has a resolution of over 300 dpi. The iPhone 4, which was also announced in June, 2010, has a screen resolution of 326 dpi and was the first Apple product to include a retina display.
The name retina display refers to way the high-resolution display appears to the human eye. When a display has a resolution over 300 dpi, most humans cannot recognize individual pixels when viewing the screen from a distance of about 12 inches. Therefore, the pixels seem to run together, creating a smooth appearance. This is similar to digital audio that is recorded with a high sampling rate. Since the audio samples are so close together, we perceive the sound as a smooth analog signal.
Since some people have better vision than others, there is no scientifically accurate number that defines a retina display. In fact, some people may in fact be able to identify individual pixels in a retina display. Still, compared to a typical computer monitors, which has a resolution of 72 dpi, a retina display will look noticeably sharper to all users.
Retina displays are especially useful for reading text on a small screen, such as an iPhone or iPod Touch. The increased resolution makes small text legible and medium-sized text easier to read. As display technology continues to evolve, retina displays are expected to be made available in larger devices, such as the iPad and HiDPI monitors. -
Responsive Web Design
Responsive web design (or RWD) is a type of web design that provides a customized viewing experience for different browser platforms. A website created with RWD will display a different interface depending on what device is used to access the site. For example, a responsive website may appear one way on a laptop, another way on a tablet, and still another way on smartphone.
Today, many people access websites from mobile devices, rather than desktop computers or laptops. While most smartphones can display regular websites, the content is difficult to read and even harder to navigate. Therefore, many web developers now use responsive web design to provide a better web browsing experience on small screens.
Websites designed for mobile devices (such as iOS and Android phones), typically have a larger default font size and simplified navigation. Some sites also take advantage of the touchscreens interface, providing support for swiping, rotating, and pinching and zooming. A mobile-optimized website may also remove unnecessary content to reduce the need for scrolling. Image rollovers and other mouse hover features are often removed, since touchscreens dont support a mouse pointer.
There are several ways to implement responsive web design. One method is to dynamically detect the users platform (such as an iPad or iPhone) and load specific HTML and CSS for the corresponding device. Another option is to use media queries, which automatically load different CSS styles depending on the size of the browser window. The Bootstrap package, which contains several prewritten JavaScript and CSS files, is based on media queries and is commonly used in responsive web design. -
RE: Hand clap
A gesture that involves the clapping of both hands (preferably) at the stomach/crotch region, and then raising the right hand making a fist above your head in full extension of the arm.
This balla motion is used as a formal gerrting, or used to agree with a fellow hand-clapper. -
Recycle Bin
When you delete a file or folder in Windows, it is placed in the Recycle Bin. Items are temporarily stored in the Recycle Bin before they are permanently deleted by the user.
The Recycle Bin is located on the Windows desktop. When it is empty, the icon is an empty recycle bin. If it contains one or more items, the icon changes to a recycle bin with papers in it. You can move items to the Recycle Bin by either dragging them to the Recycle Bin icon or by selecting the items and pressing the Delete key. You may also right-click an item and select Delete from the pop-up menu.
You can open the Recycle Bin by double-clicking its icon. This allows you to view the files the Recycle Bin contains, just like a typical folder. However, in the left sidebar of the window, there is a Recycle Bin Tasks section that includes the options Empty the Recycle Bin and Restore all items. Since Windows remembers the original location of each item, if you select Restore all items, the files will each be placed back in their original location. You can also select items individually and restore them back to their previous folders.
Emptying the Recycle Bin
If you select Empty the Recycle Bin, all the items in the Recycle Bin will be will permanently deleted. If you only want to delete a single item, you can select it, press Delete, then confirm you want to delete it. Deleted items cannot be restored, so you should only empty the Recycle Bin if you are sure you no longer need the files. It is a good idea to empty the Recycle Bin on a regular basis because it frees up disk space for other files.
Recycle or Trash?
The Recycle Bin serves the same purpose as the Trash found on Macintosh computers. While the name is not as simple, it is admittedly, more eco-friendly. It also reflects the idea that when you empty the Recycle Bin, it makes more disk space available, thereby recycling the sections of the disk that contained the previous data. -
Parity
Parity is a mathematical term that defines a value as even or odd. For example, the number 4 has an even parity, while the number 5 has an odd parity. When even and odd values are compared, such as 4 and 5, they are considered to have different parity. If two even or odd values are compared with each other, they have the same parity.
In computer science, parity is often used for error checking purposes. For example, a parity bit may be added to a block of data to ensure the data has either an even or odd parity. This type of error detection is used by various data transmission protocols to ensure that data is not corrupted during the transfer process. If the protocol is set to an odd parity, all packets received must have an odd parity. If it is set to even, all packets must have an even parity. Otherwise, a data transmission error will occur and the corresponding packet(s) will need to be resent.
Parity is also used in a type of computer memory called parity RAM. This type of RAM stores a parity bit with each byte of data to validate the integrity of each byte. Therefore, 9 bits of data are required for every byte stored in the RAM. While parity RAM was commonly used in early computers, memory has become more reliable and therefore most systems now use non-parity RAM. High-end workstations and servers, which require consistent data integrity, typically use ECC RAM, which provides a more advanced means of error checking than standard parity RAM. -
Multithreading
Multithreading is similar to multitasking, but enables the processing of multiple threads at one time, rather than multiple processes. Since threads are smaller, more basic instructions than processes, multithreading may occur within processes.
By incorporating multithreading, programs can perform multiple operations at once. For example, a multithreaded operating system may run several background tasks, such as logging file changes, indexing data, and managing windows at the same time. Web browsers that support multithreading can have multiple windows open with JavaScript and Flash animations running simultaneously. If a program is fully multithreaded, the different processes should not affect each other at all, as long as the CPU has enough power to handle them.
Similar to multitasking, multithreading also improves the stability of programs. However, instead of keeping the computer from crashing, multithreading may prevent a program from crashing. Since each thread is handled separately, if one thread has an error, it should not affect the rest of the program. Therefore, multithreading can lead to less crashes, which is something we can all be thankful for. -
null
In order for a hard disk or disk partition to be accessible by a computer, it must first be mounted. This is a software process that activates the disk, which makes the folders and files on the disk readable by the computer. If a hard drive is physically connected, but not mounted, the computer will not recognize it.
Fortunately, most operating systems, such as Windows and Mac OS X, mount newly connected disks by default. In Windows, the disk will appear in the My Computer window. In Mac OS X, the disk will appear on the desktop. This is true for all types of disks, such as internal and external hard drives, optical media, such as CDs and DVDs, and USB flash drives. Disk image files may have to be mounted manually using a program like Nero or WinImage (Windows) or Apple Disk Utility (Mac OS X).
If a disk is not being used, it can be unmounted. Optical disks are typically unmounted automatically when they are ejected. However, before you disconnect an external hard drive or a USB flash drive, you should unmount the disk to avoid possible data corruption. -
null
One kilohertz (abbreviated kHz) is equal to 1,000 hertz. Like hertz, kilohertz is used to measure frequency, or cycles per second. Since one hertz is one cycle per second, one kilohertz is equal to 1,000 cycles per second.
Kilohertz is commonly used to measure the frequencies of sound waves, since the audible spectrum of sound frequencies is between 20 Hz and 20 kHz. For example, middle C (C4) on a piano keyboard produces a frequency of 261.63 Hz. The C key two octaves above middle C (C6) produces a frequency of just over 1 kHz (1,046.5 Hz). Since the sound frequency doubles with each octave, the C7 key produces an audible frequency of just over 2 kHz (2,093 Hz). As you might guess, frequencies above 2 kHz sound very high-pitched.
Sound waves and low frequency radio waves are often measured in kilohertz. Other waves, such as high frequency radio waves, visible light waves, and ultraviolet rays, have much higher frequencies. Therefore, most waves in the electromagnetic spectrum are measured in megahertz, gigahertz, or even greater units of measurements.
Abbreviation: kHz -
RE: Backpacker
Person who dislikes Mainstream and Commercial rap a lot.
Person who raps about real life shit that matters and has experienced, rarely about pimping hoes/having millions/selling immense ammounts of drugs/murdering random people for no apparent reason or motive.Person who is true to himself while rapping and uses his head and heart to write not only a pen and meaningless words.
-
Keylogger
A keylogger is a program that records the keystrokes on a computer. It does this by monitoring a users input and keeping a log of all keys that are pressed. The log may be saved to a file or even sent to another machine over a network or the Internet.
Keylogger programs are often deemed spyware because they usually run without the user knowing it. They can be maliciously installed by hackers to spy on what a user is typing. By examining the keylog data, it may be possible to find private information such as a username and password combination. Therefore, keyloggers can be a significant security risk if they are unknowingly installed on a computer.
The best way to protect yourself from keylogger programs is to install anti-virus or security software that warns you when any new programs are being installed. You should also make sure no unauthorized people have access to your computer. This is especially true in work environments. You can also periodically check the current processes running on your computer to make sure no keyloggers or other malware programs are active. While it is unlikely that you have a keylogger programs installed on your computer, it is definitely worth it to check. -
IVR
Stands for Interactive Voice Response. IVR is a telephony technology that can read a combination of touch tone and voice input. It gives users the ability to access a database of information via phone. A typical IVR system has several menus of prerecorded options that the caller can choose from. While many choices are as basic as choosing a number, some options may require the caller to speak detailed information such as his name or account number. This input is read by the IVR system and is used to access the appropriate information in the database.
For example, a bank may have an IVR system that allows members to call in and check their balance or recent transactions. Credit card companies and stock brokerage firms also use IVR systems to allow users to access information from their account. The technology can also be used used for other purposes such as phone surveys, checking movie times, and call center forwarding. Because the caller can vocally respond to prerecorded messages, using an IVR system is almost like talking to another human being. That is, as long as it understands you. -
iCloud
iCloud is an online service provided by Apple. It provides an email account, online storage, and backup services. It also allows you to share data between devices, such as Macs, iPhones, and iPads.
Below is a list of features included with iCloud:
Several Apple applications support iCloud, meaning you can save a document from one device and open and edit it on another one. For example, you can create a presentation using Apple Keynote on an iMac, save it in iCloud, then open it on your iPad at a later time. The primary apps that support iCloud include Pages (word processing documents), Numbers (spreadsheets), and Keynote (presentations). iCloud includes web-based versions of these applications as well.
Apples iCloud service is free to use and can be accessed using an Apple ID on any supported device. If you need additional online storage, you can purchase extra storage space for a monthly fee.
NOTE: iCloud is an evolution of Apples cloud computing services. Previous versions include iTools (2000), .Mac (2002), and MobileMe (2008). iCloud, which replaced MobileMe, was launched in 2011.
iCloud Web Interface
-
RE: Hover
When you roll the cursor over a link on a Web page, it is often referred to as hovering over the link. This is somewhat like when your boss hovers over you at work, but not nearly as uncomfortable. In most cases, the cursor will change from a pointer to a small hand when it is hovering over a link. Web developers can also use cascading style sheets (CSS) to modify the color and style of link when a user hovers over it. For example, the link may become underlined or change color while the cursor is hovering over it.
The term hovering implies your computer screen is a three-dimensional space. In this conception, your cursor moves around on a layer above the text and images. When you click the mouse button while the cursor is hovering over a link, it presses down on the link to activate it. Hovering can also be used in a more general sense such as moving the cursor over icons, windows, or other objects on the screen. -
RE: Heuristic
Generally speaking, a heuristic is a rule of thumb, or a good guide to follow when making decisions. In computer science, a heuristic has a similar meaning, but refers specifically to algorithms.
When programming software, computer programmers aim to create the most efficient algorithms to accomplish various tasks. These may include simple processes like sorting numbers or complex functions such as processing images or video clips. Since these functions often accept a wide range of input, one algorithm may perform well in certain cases, while not very well in others.
For example, the GIF image compression algorithm performs well on small images with few colors, but not as well as JPEG compression on large images with many colors. If you knew you were only going to be dealing with small images that didnt have a wide range of colors, GIF compression would be all you need. You wouldnt have to worry about large, colorful images, so there would be no point in optimizing the algorithm for those images. Similarly, computer programmers often use algorithms that work well for most situations, even though they may perform inefficiently for uncommon situations.
Therefore, a heuristic process may include running tests and getting results by trial and error. As more sample data is tested, it becomes easier to create an efficient algorithm to process similar types of data. As stated previously, these algorithms are not always perfect, but work well most of the time. The goal of heuristics is to develop a simple process that generates accurate results in an acceptable amount of time. -
HDTV
Stands for High Definition Television. HDTV is a high-quality video standard developed to replace older video formats often referred to as SDTV (standard definition television). While HDTVs video quality is one of the most noticeable improvements over SDTV, HDTV includes a number of other important improvements as well.
First of all, the HDTV signal is digital. Instead of an analog signal, used by traditional NTSC broadcasts, HDTV is always digital. This eliminates analog interference caused be electrical currents and magnetic fields. Secondly, HDTV uses a different aspect ratio than SDTV. While previous broadcasts used a 4:3 ratio (4 units wide for every 3 units tall), HDTV uses a ratio of 16:9. This wider aspect ratio more closely emulates how humans see the world, making the image appear more realistic. This ratio is also better for watching widescreen movies, which are recorded in widescreen for the same reason.
True to its name, high definition television offers a much higher resolution than standard definition video. While a typical analog broadcast in the U.S. contains a maximum of 525 horizontal lines of resolution, an HDTV signal supports up to 1080. The three formats used by HDTV are 1080i (interlaced), and 720p and 1080p (progressive). HDTVs higher resolution produces images that are much finer and contain more detail and more color than previous formats. HDTV also provides a higher-quality digital audio signal than SDTV and supports up to six audio channels compared to the two channels allowed previously.
To watch HDTV, you need an HDTV-compatible television and a means of receiving an HDTV signal. HDTVs come in both 16:9 and 4:3 formats (for backwards compatibility). Some HDTVs include HDTV tuners for receiving over-the-air broadcasts, but others require the receiver to be bought separately. Fortunately, most cable and satellite TV companies offer HDTV-compatible boxes with their digital service plans.