تبلیغات
آموزش حرفه ای کامپیوتر و شبکه - دیکشنری هکری

آموزش حرفه ای کامپیوتر و شبکه

به وبلاگ گروه Persiansec خوش آمدید

 

  
 
  
. با کلیک روی ستاره ها به وبلاگ امتیاز دهید 

www.persiansec.com

دوشنبه 27 مهر 1388

دیکشنری هکری

نویسنده: Soheil n   طبقه بندی: آموزش،  English Doc،  IT، 

 


>.ACCESS:the ability to get into something or locate something on a network or local machine. 

>.ACCESS CODE:also known as login name or user id and password on a network which reguires u to login. 

>ACCESS PERMISIONS:this allows u to execute,read or change a file depending on the permsion 

>.ACCOUNT:your presence id on a computer system which allows u to login. 

>.ADAPTER:another name for an expansion card,usally most of them plug into your expansion slots on your pc. 

>ACTIVE X:a set of interacitve techonloiges devloped by Mcft,activex isnt a programming language but it can be dangerous for website viruses. 

>ACTIVE OPEN:a state in which TCP is attempting to initiate a connection. 

>ADDRESS:a memory location.The value is often displayed as hexadecimal,mostly to keep anyone but official pc postal employes from finding things on your computer>every thing on your hard drive has a memory location. 

>ADDRESS CLASS:a basic network of various sises.the network class can be determend from the first octet of its ip address 

>ADDRESS RESOULUTION PROTOCOL:the process of determining a MAC address, given a more abstract LAN or WAN address. Any protocol used to obtain a mapping from a higher layer address to a lower layer address. Abbreviated ARP. The acronym ARP is most often used to refer to the Ethernet Address Resolution Protocol (below). The protocol used by an IP networking layer to map IP addresses to lower level hardware (i.e., MAC) addresses. There are four ARP messages for IP running over Ethernet: arp requests and replies and reverse arp request and replies. <ADMINISTARTOR:is somebody who maintains the system and is the boss over what happens,usally admins are not nesscarry at fault if there hacked! 

>ADSL:adsl(asymetic digital subscriber line):is a connection to the net were users dont use dial up but have a connection 24/7 and usally have a static ip address. 

>ADA: Pascal-descended language that was at one time made mandatory for Department of Defense software projects by the Pentagon. Hackers are nearly unanimous in observing that, technically, it is precisely what one might expect given that kind of endorsement by fiat; designed by committee, crockish, difficult to use, and overall a disastrous, multi-billion-dollar boondoggle (one common description wss "The PL/I of the 1980s"). Hackers find Ada's exception-handling and inter-process communication features particularly hilarious. Ada Lovelace (the daughter of Lord Byron who became the world's first programmer while cooperating with Charles Babbage on the design of his mechanical computing engines in the mid-1800s) would almost certainly blanch at the use to which her name has latterly been put; the kindest thing that has been said about it is that there is probably a good small language screaming to get out from inside its vast, elephantine bulk. 

>AGENT:A program that performs one or more services (such as gathering information from the Internet), acting for or as a principal. 

>ADVANCED PEER-TO-PEER NETWORKING(APPN):An IBM peer-to-peer networking architecture that uses interconnected Type 2.1 nodes. APPN supports dynamic routing,directory searches, and network management. >ADVANCED PROGRAM-TO-PROGRAM COMMUNICATIONS(APPC) SNA's standard program-to-program communications protocol. Sometimes the term APPC is used interchangeably with Logical Unit Type 6.2 (LU 6.2). 

ALERT:A problem determination message sent to a network operator within IBM's network management system. 

>ALOHA :A 4800bps Contention Based Radio Channel Transmission System Network used in the University of Hawaii (1968 - 1972) and designed by Morman Abramson to connect the university's mainfraim IBM 360 on the Island of Oahu and terminals plaaced throught different ships and nearby islands. Data coming from the mainfraim was sent to all other terminals while data from terminals was the Contention-Based part and would re-send data if no acknowledement data was received. VLAN : Virtual Local Area Network This is a network split into workgroups by routers and each assigned a server. As any message sent will have which workgroup it is aimed at, wokgroups not receiving messages can run faster as traffic is reduced. Standards --------- Ethernet : A Network standard that is a Contention-Based Network. Ethernet evolved from a radio channel transmission system called ALOHA. 

>ALT:is commenly known as a computer control key but in internet terms alt is for connecting to newsgroups just like www is for connecting to the web. 

>ALT.2600.hackers:is a newsgroup with about 200 posters and about 5000 lurkers,it is the group shady_harrasment_panda(writter of this dictioanryis a member of.alt.2600.hackers has alot of very intellegent hackers in the group. 

>ALTERNITIVE CLIENT RESTOREL:The process of restoring files to a different client than the one from which they were backed up. 

>.AMERICAL ONLINE(AOL):a large US owned internet service provider company which mainly attracts newbies,aol has the stricted rules out of all the isp ifu post to an hackers newsgroup they terminate your account!,aol commenly attracks lamers! 

>.ANTIVIRUS:a program which scans a users hard drive looking for known viruses,worms,trojans,and joke files. 

>AMIGA:A series of personal computer models originally sold by Commodore, based on 680x0 processors, custom support chips and an operating system that combined some of the best features of Macintosh and Unix with compatibility with neither. 

The Amiga was released just as the personal computing world standardized on IBM-PC clones. This prevented it from gaining serious market share, despite the fact that the first Amigas had a substantial technological lead on the IBM XTs of the time. Instead, it acquired a small but zealous population of enthusiastic hackers who dreamt of one day unseating the clones (see Amiga Persecution Complex). The traits of this culture are both spoofed and illuminated in The BLAZE Humor Viewer. The strength of the Amiga platform seeded a small industry of companies building software and hardware for the platform, especially in graphics and video applications (see video toaster). 

Due to spectacular mismanagement, Commodore did hardly any R&D, allowing the competition to close Amiga's technological lead. After Commodore went bankrupt in 1994 the technology passed through several hands, none of whom did much with it. However, the Amiga is still being produced in Europe under license and has a substantial number of fans, which will probably extend the platform's life considerably. viruses,common virus scanners include norton and mcafee. 

>AMP OFF:[Purdue] vt. To run in background. From the UNIX shell `&' 

>

ANSI; n. [techspeak] The American National Standards Institute. ANSI, along with the International Organization for Standards (ISO), standardized the C programming language (see K&R, Classic C), and promulgates many other important software standards. 2. n. [techspeak] A terminal may be said to be `ANSI' if it meets the ANSI X.364 standard for terminal control. Unfortunately, this standard was both over-complicated and too permissive. It has been retired and replaced by the ECMA-48 standard, which shares both flaws. 3. n. [BBS jargon] The set of screen-painting codes that most MS-DOS and Amiga computers accept. This comes from the ANSI.SYS device driver that must be loaded on an MS-DOS computer to view such codes. Unfortunately, neither DOS ANSI nor the BBS ANSIs derived from it exactly match the ANSI X.364 terminal standard. For example, the ESC-[1m code turns on the bold highlight on large machines, but in IBM PC/MS-DOS ANSI, it turns on `intense' (bright) colors. Also, in BBS-land, the term `ANSI' is often used to imply that a particular computer uses or can emulate the IBM high-half character set from MS-DOS. Particular use depends on context. Occasionally, the vanilla ASCII character set is used with the color codes, but on BBSs, ANSI and `IBM characters' tend to go together. 

>ANGLE BRASKET: Either of the characters `<' (ASCII 

>ANTIONLINE:is one of the many comprehensive securirty firms on the net which specialises in exploits,news,and hacker related things.www.antionline.com 

>.API(aplicatio program interface):defines a standard way that programs work with pull down menu's,dilogue boxes e.t.c,windows and OS/2 are examples of api in action. 

>.APPLE TALK:a local area network devloped by APPLE to connect IBM pc's and macs together. 

>APPLET:a HTML based program built with java that a browser tempory downloads to a users disk. 

>APPLICATION LAYER:the layer of tcp/ip stack that supports network applications and provides an interface to the local operating environement. 

11.ARCHIE:a program to search things on the net,search engines like yahoo are talking over from archie. 

>APACHE:is a webserver used by almost 60 per cent of the web sites market that runs on windows,macs,and unix. 

.>APP: Short for `application program', as opposed to a systems program. Apps are what systems vendors are forever chasing developers to create for their environments so they can sell more boxes. Hackers tend not to think of the things they themselves run as apps; thus, in hacker parlance the term excludes compilers, program editors, games, and messaging systems, though a user would consider all those to be apps. (Broadly, an app is often a self-contained environment for performing some well-defined task such as `word processing'; hackers tend to prefer more general-purpose tools.) See killer app; oppose tool, operating system. 

>.APPLE SHARE:a network o/s devloped by apple to work with other macs,like win nt and win ME are desined to work the together. 

>ARCHIE:a client/server program that is used to locate files on anonymous ftp. 

>.ARCHIVE:a place with important files on the net. 

>AREA CODE:area code is the code for a phone number for ppl accesing it outside the city,dial up hacking or connecting to your isp involves uses an area code. 

>.ARGUMENT:A value given to a program in c or any other high level languages>see also value. 

>.ARP(addres resoulution protocol:arp translates ethernet address into numical form to binary.all o/s support arp by typing arp in the command prompt. 

>APRAnet(advanced research projects agency network)is a denfence agency network created by defense department of the USA known now as da-apra 

>ARM(application response measurement): 

>.ARRAY:a collectiong of similar info such as codes,text or other items.All items are usally of the same type,used in programming. 

>.ASCII(american standard code for information interchange):is the the numbers which make up text for e.g the code 52 would be the number 4 

>ASCII ART: n. The fine art of drawing diagrams using the ASCII 

>ASM(asembly language):is a low level program language which is used for writting small programs and can be used to write viruses.Assembly Languages have the same basic structure as Machine Languages, the difference is that Assembly Languages allow the programmer to use names instead of numbers. As with Machine Languages, every CPU has its own unique machine language. Programs must be rewritten or recompiled, therefore, to run on different types of computers. Nowadays most programming is done with High-Level Programming Languages but in the early days, Assembly language was always used, now it is ONLY used when speed is essential or when the task isn't possible on the High-Level Language we are using. These are considered Low-Level Languages as they are closer to Machine Languages. 

>ASYNCHRONOUS TRANSFERE METHOD:A connection-oriented data communications technology based on switching 53 byte fixed-length units of data called cells. Abbreviated ATM. Each cell is dynamically routed. ATM transmission rates are multiples of 51.840 Mbits per second. In the United States, a public communications service called SONET uses ATM at transmission rates of 155, 622, 2048, and 9196 Mbits per second. These are called OC-3, OC-12, OC-48, and OC-192 respectively. A similar service called SDH is offered in Europe. ATM is also used as a LAN infrastructure, sometimes with different transmission rates and coding methods than are offered with SONET and SDH. 

>AT&T:american phone company there are also the makers of unix,at&t owns the bells lab which wrote unix and c. 

>AUTHENTICATION: A security measure for verifying the identity of network users. 

>AVATAR:The body in cyberspace. In most cases the handle/nicknames you use on the Internet, and the personality that goes with it. 

>AWK: [UNIX techspeak] An interpreted language for massaging . 

>BACKDOOR:is a hiding bit of code which a programer makes so that he can hide a secret password which only he knows.>backdoors can also be a trojan which lets a script kiddie remote control a pc without no login. 

>.BANDWITH:the speed of which is sent to the moniter meguared in hertz. 

>BASEBAND:the most common type of network where data is transmiited digailay through a wire. 

>.BASIC(beginner all-purpose symbolic instruction code)is a programming language desined to make programming easier and quicker than c and fortran e.t.c.,modern verions of basic are visual basic and quickbasic. 

<BASH:is a linux command interface like windows ms dos but with more power. 

24.BATCH FILE(.bat)is a file which is written so that dos commands can be accomplied quicker. 

>BAUD RATE:is usally related to the speed of the modem for.e.g 56k. 

>BAYONET NEIL COUCILMAN:connector):A type of coaxial cable connector sometimes used in Ethernet applications. Abbreviated BNC. The specification for BNC connectors is contained in EIA/TIA 403-A and MIL-C-39012. 

> BER(Bit Error Rate.): 

>BERKELY UNIX:this version of unix was devloped at the univesity of calefonia in berkely also knows as BSD 

>.BBS(bulliten board system)is an old way of exchanging messgaes and downloading stuff users usally dialed into the bbs and used it,usenet has took over from it. 

>.BIN:a binary file.Also on unix the binary files are usally in /bin and on windows c:\windows 

>.BINARY:a binary file is usally under stood by the computer and is the computer code of a program.binary is written in 0's and 1's. 

>BIND:The SNA command that starts an SNA session between two logical units. 

>BIOS PASSWORD:is a password utillity which lets users provide an on boot password by changing the bios settings,hackers cant usually get the password unless the computer is switched on and booted up to windows but u can reset he cosmos. 

<BIT MASK:a pattern of binary values. 28.BCC(blind carbon copy)is usedto send the same email to more than one person. 

>BLACK ICE:is a monetering program used for watching ports. 

>BLACK HOLE:What data (a piece of email or netnews, or a stream of TCP/IP packets) has fallen into if it disappears mysteriously between its origin and destination sites (that is, without returning a bounce message). 

>BLACK SCREEN OF DEATH:On an attempt to launch a DOS box, a networked Windows system not uncommonly blanks the screen and locks up the PC so hard that it requires a cold boot to recover. This unhappy phenomenon is known as The Black Screen of Death. 

>BLUE SCREEN OF DEATH:is when a windows machine crahses or gets nuked and shows the blue screen which shows that an error has occured. 

>BLUE BOX(not a hacker term but i will mention it): Once upon a time, before all-digital switches made it possible for the phone companies to move them out of band, one could actually hear the switching tones used to route long-distance calls. Early phreakers built devices called `blue boxes' that could reproduce these tones, which could be used to commandeer portions of the phone network. (This was not as hard as it may sound; one early phreak acquired the sobriquet `Captain Crunch' after he proved that he could generate switching tones with a plastic whistle pulled out of a box of Captain Crunch cereal!) There were other colors of box with more specialized phreaking uses; red boxes, black boxes, silver boxes, etc. 2. n. An IBM machine, especially a large (non-PC) one. 

>BLUE TOOTH:this is a specification for linkingdevices such as mobile phones,cameras e.t.c to computers over a short range wireless connection. 

<BO(BACK orificie):a trojan hourse created by the cult of the dead group,back orrifice was called after Mcft back orrifice's server. 

<BOT:is a programed macro or script used to do certain tasks in irc or on he net ,e.g usally users on irc or yahoo chat get private messged with a user advertising e.t.c but its not a user but is known as a bot. 

>.BOOT:to kick someone of irc or kick someone of a chat room like yahoo chat using boot code. 

<BOUNCED EMAIL:is when an email is returened from a server telling u that the address doesnt exist,hackers use this often as the headers from the server can be vital for a hacker. 

>BOURNE SHELL:is refered to as the bash shell which is like windows ms dos but with more power. 

>BOX:is refered to as the o/s a user or host is on e.g windows box. 

>BOXES:A variety of electronic devices used to aid in phreaking. 

>.BPS(bits per sec) 

>BRACKET PROROCOL:The SNA rules for the initiation of a bracket between two LU-LU half sessions. Brackets delimit bi-directional data flows for transactions. 

>BRIDGE:a connectivity device that fowards data based on physical networks. 

>BROUTER:a connectivity device that routes routable protocols and bridges non routable protocols. 

>BROWSER:A program specifically designed to help users view and navigate hypertext, on-line documentation, or a database. While this general sense has been present in jargon for a long time, the proliferation of browsers for the World Wide Web after 1992 has made it much more popular and provided a central or default techspeak meaning of the word previously lacking in hacker usage. Nowadays, if someone mentions using a `browser' without qualification, one may assume it is a Web browser. 

>BRUTE FORCE:to try thousand of differnt passwords on a login prompt or on a password protected file. 

>BSD:a unix o/s from berkely;s 

>.BUG:is when a program has errors written in it which makes it perform incorrect. 

>Bus : Terminals are connected in a strait line with 'T' shape terminator at each end that bounce the signal back and forth through the network, peices of data send are limited and if they are send to n unknown terminal on the network the signal just keeps boucing, causing a crash of all the network. The Bus network is a peer to peer network and had no dedicated server. 

>BUS NETWORK:is a network where all computers are connected through a hub and each computer usuall has a network interface card. 

33.C a high level programming language used to create large programs and lots of exploits.e.g 

#include <stadio.h> main ( ) ** printf ("you are viewing the beta version.\n"); printf ("www."); } 

>.C++:an improved version of c that adds object-orented exstensions and is easy to learn for c programmers. 

>CCC [Chaos Computer Club]:A hacker-organisation in Hamburg. They have meetings, lectures and annual congresses which attracts hackers from all Europe. They also publish books and magazines about the information society. There are a lot of myths of which kind of criminal activities they have been involved in, so it's hard to say which of them is true and which are not. 

>C SHELL:is a shell similar to the bash shell but it is more like the c langauge on a command promt. 

>.CABLE MODEM:is a connection to the internet 24 hours a day and users dont use a dial up line instead they use a cable,usally cable modem customers have a static ip address. 

>CACHE:is a tempory folder on a hard disk which stroes websites e.t.c so that a user can acces them quicker. 

>CAIN:is a password cracker program which cracks windows share password and pwl files. 

36.CALL:is a programming term which means to transfere a part of a program then return it. 

<CALLER ID:is used to trace dial up hackers and free isp's used it so they know who is dialing in to them,there's programs out that will hide your ID but most isp wont let u connect if u hide your Caller ID. 

>.CARRIIER(dial ups): a signal used by a modem to detect another modem. 

>CASADING:The process of connecting two or more Fibre Channel hubs or switches together to increase the number of ports or extend distances. 

>.CAT:a unix command which displays the contents of a file. 

>CC(carbon copy)used for sending the same email to more than on person. 

>.CD:change directory used for chaging the dir on all systems prompts also chdir 

<CERT:is a Securuty firm which started in 1988 to help network admins and publish network securit information. 

>.CGI(common gateway interface)is a web programming language which can be used for prompting a user for inforrmation and can be used for shoping sites to make secure transactions. 

>CHANNEL:is a irc chat room where ppl chat. 

>CHANNEL OP:is the person or person's on a channel who control it. 

>CHAP(challenge handshake authentication protcol): 

>CHAR:shorthand for `character'. Esp. used by C programmers, as `char' is C's typename for character data. 

>.CHAT visly u know what a chat room is but certain network administraters have chat built into their security which means if there hacked they can disconnect u then chat and tell u that your traced e.t.c 

>CHECKSUM:a 16 bit calculated field used to ensure detection of currupted datagrams. 

>CHERNOBYL PACKETL:A network packet that induces a broadcast storm and/or network meltdown, in memory of the April 1986 nuclear accident at Chernobyl in Ukraine. The typical scenario involves an IP Ethernet datagram that passes through a gateway with both source and destination Ether and IP address set as the respective broadcast addresses for the subnetworks being gated between. Compare Christmas tree packet. CIRCLE:This is also a simple setup and poses most of the same problems as the bus NET. Basically, it is just a Bus NET with the two spare ends connected to each other. The main differences between this and the Bus NET is that, each computer acts as an amplifier to the signals passed along it (Active). There is also another communication method used here called token passing. This consists of a token passing along the network, when a computer wishes to pass on information, it will be attached to the token the it will travel round the network until it finds its destination,. The destination will then pick it up copy it and send a new token into the network. If the information in a Circle NET does not find its destination, then it will go in a complete circle and return to the sender with a message, reporting the problem. This type of topology is very similar to the Bus NET with the same drawbacks and the same advantages 

>CLUSTER CONTROL:The common name given to SNA Type 2.0 Peripheral Nodes. Usually used to refer to 3270-type control units. 

>CODEZ D00DZ:HACKERS's version of pirates. 

>COMMUNICATION CONTROLER:An SNA communications processor whose operations are controlled by Network Control Program (NCP) software.Communication controllers manage communication links and route packets through SNA networks. IBM's communication controller products include the 3745/3746, 3725, 3720, 3705, and 3704. 

>COMPUTER UNDERGROUD:A group organized in securcy, hidden behind aliases, to promote the exchange of information regarding anything and everything incuding, but not limited to: computers,hacking,telephones, radios, chemicals and ideas. 

>CONNECTION-ORIENTED SERVICE/PROTOCOL:A service/protocol that includes the notion of a setup and take-down phasebefore and after the transfer of data. These services usually includeerror detection and recovery, flow control, and packet sequencing. 

>CONNECTION SERVICE/PROTOCOL: A service protocol that does not include the notion of a setup or take-down phase before and after the transfer of data. Each message, commonly called a datagram, is sent as a separate entity. 

>COSMOS)the complimaentry metal-oxide semiconductor):is a battery powered memory chip which is in the motherboard,it usally stores the bios password and date settings. 

>.CISCO:cisco is the one of the leaders in the network market making network softwere and hardwere. 

>CLASS C/B/A>NETWORK:is the way ppl are given an ip address from their isp or network proider,class c is the isp way for an ip address 

>CLI(Command line interface):is also known as an interface were u type commands such as in dos. 

<CLIENT:is a user who connects to a server. 

<CLIENT FOR Mcft NETWORKS:a 32 bit protected mode file system friver to support all Mcft networking products that use smb file sharing! 

<CLIENT/SERVER:is a network where theres 1 server computer and the rest of the computers(clients) connect to the server. 

>CMIP:Acronym for Common Management Information Protocol. 

>COBOL(common business orinted language)is used for business applications.cobol is rarely used now. 

>.CODE rogramers instructions also known as programming language writting,code is the writting in a program which makes it perform to do certain instruction and tasks. 

>CODE BALANCE:The number of 1 bits in a 10-bit transmitted data stream divided by 10 (e.g., 1110100011 has a code balance of 6/10 = 60%). 

>.COLLIO:is a US hacker cracker who nuked yahoo.com and ebay in early 2000. 

>.COM PORT:is a port on your computer were modem usally connect to. 

>.COMMAND PROMPT:is the screen on an o/s which u can type commands e.g Mcft dos,lilo prompt,bash,csh prompt. 

>.COMPILE:to convert programming code into machine language. 

>.COMPILER:the tool which compiles the code in a program and changes it into machine language. 

>Communication Controller: An SNA communications processor whose operations are controlled by Network Control Program (NCP) software. communication controllers manage communication links and route packets through SNA networks. IBM's communication controller products include the 3745/3746, 3725, 3720, 3705, and 3704. 

>.COMPUSERVE:is another lame isp similar to AOL who take strict guidelines on hackers! 

>Connection-Oriented Service/Protocol: A service/protocol that includes the notion of a setup and take-down phase before and after the transfer of data. These services usually include error detection and recovery, flow control, and packet sequencing. 

>CONNECTION PROTOCOL:a protocol tat transmities data without operating through a connection 

<CONFIGARTION:The process of installing or removing hardware or software components required for a system or subsystem to function. Assignment of the operating parameters of a system, subsystem or device. Disk array configuration, for example, includes designating the array's member disks or extents, as well as parameters such as stripe depth, RAID model, cache allowance, etc. The collection of a system's hardware and software components and operating parameters. cf. array configuration, physical configuration. connection 

>CONSOLE:A device for graphical or textual visual output from a computer system. In systems, network and device management, an application that provides graphical and textual feedback regarding operation and status, and that may accept operator commands and input influencing operation and status. Sometimes called enterprise management console. 

>COPY ON WRITE:A technique for maintaining a point in time copy of a collection of data by copying only data which is modified after the instant of replicate initiation. The original source data is used to satisfy read requests for both the source data itself and for the unmodified portion of the point in time copy. cf. pointer remapping 

>Contention-Based Network : Network that sends a limited amount of data and holds other data in a queue until it s ready to send it. The name means, that all data being sent is competing or contending for bandwith. The ALOHA Radio system in 1968 was based on this. 

>.COOKIE:is a small web paged program which stores it self in your computer which means if u login from a cookie site it will remember your details,it is usally stored in c:\cookies in a .txt file. . >COPY:to copy a file on an o/s windows e.g is copy filename filename unix e.g is cp /filename /filename 

>COAXIAL CABLE:An electrical transmission medium consisting of two concentric conductors separated by a dielectric material with the spacings and material arranged to give a specified electrical impedance. cf. triaxial cable 

>CP/M:is an old o/s used back in the 70's 

>CRACK:To remove software copy protection on a program such as using a sharewere program for longer than it was ment to be used.. 

<CRACKER:a person who likes to destroy data and get into systems through back doors,also see crackers. 

>CRACKERS:is a *** man who likes talking it up the ass.......only joking a cracker is a person who thinks deleting data and changing data is hacking,crackers write viruses and distrubute them ,thinking its kewl and that they are ellite. 

>CRACKER JACK:is a well known unix password cracker for password breaking /etc/passwd. 

>CSMA/CD:the network method used by ethernet networks. 

>CYPER PUNK:Since 1990 or so, popular culture has included a movement or fashion trend that calls itself `cyberpunk', associated especially with the rave/techno subculture. Hackers have mixed feelings about this. On the one hand, self-described cyberpunks too often seem to be shallow trendoids in black leather who have substituted enthusiastic blathering about technology for actually learning and doing it. Attitude is no substitute for competence. On the other hand, at least cyberpunks are excited about the right things and properly respectful of hacking talent in those who have it. The general consensus is to tolerate them politely in hopes that they'll attract people who grow into being true hackers. 

>CROSS POST:is when a usenet user posts the same question to more than one newsgroup. 

>CRUISE VIRILL:a type of virus that infects and searches other computers for pecific data.for e.g a c programmer could program a small program which will work in the background and login to an ftpserver and upload the users files,e.t.c 

>CSH:is yet another command enviroment for unix. 

>CSMA/CD Carrier Sense Multiple Access with Collision Detection.) 

>CRYPTGRAPHY:see encryption 

>CYPERPUNK:Net.person who has evolved from hacking to encryption and concern with creating multiple identities. 

>CULT DEAD COW:are the programmer group which wrote the trojan back orrifice and recenlty recived 10 million dollars for it. >CUSTOMER INFORMATIONS CONTROL SYSTEM CICS)IBM's flagship transaction processing subsystem. CICS runs on IBM mainframes as well as other systems, such as AS/400s, Hewlett-Packard UNIX platforms, and PCs running either OS/2 or Mcft's Windows NT Server operating system. 

>CUTE FTP:is an ftp client used for contacting ftp servers,cute ftp is a freewere and can be download from download.com

() نظرات
                                           رفتن به بالای صفحه




آمار وبلاگ

  • تاریخ افتتاح بلاگ:   1388/7/1
  • کل بازدید :
  • بازدید امروز :
  • بازدید دیروز :
  • بازدید این ماه :
  • بازدید ماه قبل :
  • تعداد نویسندگان :
  • تعداد کل پست ها :
  • آخرین بروز رسانی :
  • آخرین بازدید :

 

سرویس و نگهداری در کل کشور


جستجوی پیشرفته

Google

در این وبلاگ
در كل اینترنت