Intra
Within
Locution
A particular form of expression; a word, phrase, expression, or idiom, esp. as used by a particular person, group.
Cyberia
The computer and Internet world and its virtual reality.
Advent
A coming into place, view, or being; arrival.
Nibble
16 bits
Byte
8 bits
Bit
Smallest logical unit used in a computer system referring to an on or off state.
Promiscuous Mode
In computing, promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it — a feature normally used for packet sniffing.
Heaps
A large pool of unused memory,
Stacks
In computer science, a stack is an abstract data type and data structure based on the principle of Last In First Out (LIFO).
High Fidelity
High fidelity refer to high-quality reproduction of sound or images that is very faithful to the original master recording.
Heath Kit
A heathkit is an electronic component sets that are assembled by the purchaser.
Datum
Datum is a reference point, surface, or axis on an object against which measurements are made.
Big Iron
A computer that is insanely difficult to gain access to.
Check Sum
A checksum is a form of redundancy check, a simple way to protect the integrity of data by detecting errors in data.
Algorithm
In mathematics, computing, linguistics, and related disciplines, an algorithm is a definite list of well-defined instructions for completing a task;
Buffers
In computing, a buffer is a region of memory used to temporarily hold data while it is being moved from one place to another.
Port scanning
To portscan a host is to scan for multiple listening ports on a single target host. To portsweep is to scan multiple hosts for a specific listening port. The latter is typically used in searching for a specific service.
Vocoder
Vocoder analyzes speech, transforms it into electronically transmitted information, and recreates it.
Phrack
A hacking magazine started in the 1980’s released on bb’s
Little Endian
Big Endian
The adjectives big-endian and little-endian refer to which bytes are most significant in multi-byte data types and describe the order in which a sequence of bytes is stored in a computer’s memory.
Btree
B-trees are tree structures (a type of data structure) that are optimized for situations when all or part of the tree must be maintained on a secondary storage device such as an optical disk or tape. A B-tree is designed to minimize the number of disk accesses.
Quick Sort
Quicksort is a well-known sorting algorithm developed by C. A. R. Hoare.
Quicksort is a comparison sort and, in efficient implementations, is not a stable sort.
Tempest
Tempest is a device that allows to read electromagnetic radiation and turn those signals into readable signals on another device.
Iconclastic
Iconoclasm is the deliberate destruction within a culture of the culture's own religious icons and other symbols or monuments, usually for religious or political motives. It is a frequent component of major domestic political or religious changes.
Ga - Genetic Algorithm
Genetic algorithms are a particular class of evolutionary algorithms.
IDS Intrusion Detection System
Intrusion Detection System detects unwanted use and manipulation of computer systems.
Opcodes
Operation Code is a machine language instruction.
If any one knows about someone that would be interested in doing something with this work please let me know thank you.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment