Glossary

Intra
Within

Locution
A particular form of expression; a word, phrase, expression, or idiom, esp. as used by a particular person, group.

Cyberia
The computer and Internet world and its virtual reality.

Advent
A coming into place, view, or being; arrival.

Nibble
16 bits

Byte
8 bits

Bit
Smallest logical unit used in a computer system referring to an on or off state.

Promiscuous Mode
In computing, promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it — a feature normally used for packet sniffing.

Heaps
A large pool of unused memory,

Stacks
In computer science, a stack is an abstract data type and data structure based on the principle of Last In First Out (LIFO).

High Fidelity
High fidelity refer to high-quality reproduction of sound or images that is very faithful to the original master recording.

Heath Kit
A heathkit is an electronic component sets that are assembled by the purchaser.

Datum
Datum is a reference point, surface, or axis on an object against which measurements are made.

Big Iron
A computer that is insanely difficult to gain access to.

Check Sum
A checksum is a form of redundancy check, a simple way to protect the integrity of data by detecting errors in data.

Algorithm
In mathematics, computing, linguistics, and related disciplines, an algorithm is a definite list of well-defined instructions for completing a task;

Buffers
In computing, a buffer is a region of memory used to temporarily hold data while it is being moved from one place to another.

Port scanning
To portscan a host is to scan for multiple listening ports on a single target host. To portsweep is to scan multiple hosts for a specific listening port. The latter is typically used in searching for a specific service.

Vocoder
Vocoder analyzes speech, transforms it into electronically transmitted information, and recreates it.

Phrack
A hacking magazine started in the 1980’s released on bb’s

Little Endian
Big Endian
The adjectives big-endian and little-endian refer to which bytes are most significant in multi-byte data types and describe the order in which a sequence of bytes is stored in a computer’s memory.

Btree
B-trees are tree structures (a type of data structure) that are optimized for situations when all or part of the tree must be maintained on a secondary storage device such as an optical disk or tape. A B-tree is designed to minimize the number of disk accesses.

Quick Sort
Quicksort is a well-known sorting algorithm developed by C. A. R. Hoare.
Quicksort is a comparison sort and, in efficient implementations, is not a stable sort.

Tempest
Tempest is a device that allows to read electromagnetic radiation and turn those signals into readable signals on another device.

Iconclastic
Iconoclasm is the deliberate destruction within a culture of the culture's own religious icons and other symbols or monuments, usually for religious or political motives. It is a frequent component of major domestic political or religious changes.

Ga - Genetic Algorithm
Genetic algorithms are a particular class of evolutionary algorithms.

IDS Intrusion Detection System
Intrusion Detection System detects unwanted use and manipulation of computer systems.

Opcodes
Operation Code is a machine language instruction.


If any one knows about someone that would be interested in doing something with this work please let me know thank you.

No comments:

Post a Comment

Unixarcade Zazzles