home *** CD-ROM | disk | FTP | other *** search
Text File | 2001-07-11 | 116.6 KB | 2,580 lines |
- Computer-related acronyms and abbreviations + country domain extensions +
- emoticons + a bonus: "guys you don't want to mess with" / Written by
- R a v e N, F a n g and Njan, UINS=5917057, 7282174, 10807960
- <==========================================================================>
- 15/5/2000
-
- Get the latest version at http://blacksun.box.sk (we also have original
- hacking/security tutorials. Just try them, I am sure you will like them)
-
- HOW/WHY TO USE: This file might come in handy in case you come across a
- computer-related acronym, abbreviation or an emoticon which you don't know
- the meaning to. In such a case you can simply search through the file and
- find the entry you're looking for.
-
- HOW TO HELP: Want to help? Got any acronyms/abbreviations/emoticons/country
- extensions/"guys you don't want to mess with"? Want to flame or spam us? For
- the first two, send everything to barakirs@netvision.net.il.
-
- Credits: Yoav Tzur (Email=tzurhome@netvision.net.il, UIN=5849349), White
- Star (UIN=33481559), ToMeX (UIN=30026157), Zed of ZSystems (UIN=18345800),
- s0rcer0r (UIN=2115844), DARK RAIDER (UIN=23260552), JLOBee (UIN=14254931),
- Asafon (UIN=10660468), Thomas Ockens (Email=sew@dps.de), Mr. Nemesystm
- (Email=dhcorp1@hotmail.com), Hyperion.
- Shoutouts: mega shouts to White Star (UIN=33481559), Zed of Zsystems
- (UIN=18345800), Profane Existence (UIN=14767096) and all the guys who helped
- me spread this txt out.
-
- Total Count: 1765 unique acros/abbrevs/emots/exts/"guyz" (the latest version
- can me found at blacksun.box.sk)
- Heads up, here we go:
-
- [ --Acronyms and Abbreviations --]
- @ - At (mainly used in IRC but is also used in email addresses. If you don't
- know what I mean STOP READING NOW!!! Example: lol@RaveN=LOL (Loughing Out
- Loud) at RaveN)
- 10Q - Thank You (mainly used in IRC)
- 10X - Thanks (mainly used in IRC)
- 2 - Too / Two / To (mainly used in IRC. Example: me2=me too)
- 4 - For / Four (mainly used in IRC. Example: 4u=for you)
- 8 - Ate (mainly used in IRC. Example: l8r=Later)
- A/S/L - Age/Sex/Language / Age/Sex/Location
- A/UX - (A version of UNIX based on V system and UNIX 2 that works on Mac II)
- AAA - Access All Areas (a security group. http://members.tripod.com/aaareas)
- AAM - Ask A Minor (mainly used in IRC)
- AB - Abbreviate (a VI command. Type ':ab blah halb' without the 's and
- whenever you type blah (case sensitive + whole word) it will automatically
- replace it with halb. More info and VI tutorials on blacksun.box.sk)
- AC - Alternating Current / Analogical Computer
- ACCT - Account
- ACD - Automatic Call Distributor
- ACE - Adaptive Communication Environment
- ACID - Atomicity, Consistency, Isolation and Durability
- ACID / AciD - Ansi Creators in Demand (a hacking group)
- ACK - Acknowledged (first, a little about the TCP protocol. When you want to
- send something from one computer to another using TCP you need to establish
- a connection first. The sender first sends a packet with the SYN flag on. On
- this point, the receiver can decide if he wants that packet. If a firewall
- is blocking the way or there is no daemon on the specific port the packet
- will be denied and the receiver will reply with a packet with the RST flag
- on. However, if the receiver wishes to accept the connection, he will reply
- with both SYN and ACK on, and then the sender should reply with ACK, which
- means he's ready to send. This whole thing is called a "TCP 3-Way Handshake"
- and it is good for transferring files which must not be corrupted, since
- there is no packet loss, and when something goes wrong the receiver can ask
- the sender to send that packet again. On UDP, you can't make sure the packet
- will ever get to the receiver but everything goes a lot faster that way.
- This is why Realplayer (www.real.com) uses UDP. This is why video and audio
- sometimes gets a little smudged on the way (just a little? Hehe...). But in
- case you want to transfer applications or games, you cannot afford to lose a
- single BIT, because if you would the program would probably get corrupted.
- In such cases, you have to use TCP, which is a bit slower but you don't have
- to worry about losing important pieces of information. More info at the
- entry TCP)
- ACL - Access Control List (a list containing info about which user can
- access which parts of the system)
- ACM - Association for/of Computing Machinery
- ACS - Alaska Communications Systems
- ACTLAB - Advanced Communication Technologies Laboratory
- AD - Admin
- ADM - Admin
- ADC - Analog-to-Digital Conversion / Advanced Disk Catalog
- (http://www.elcomsoft.com/adc.html)
- ADFS - Advanced Disk FIling System (what new(ish))acorns and upgraded BBC's
- use to handle floppy disks)
- ADMIN - Administrator
- ADN - Any day now (mainly used in IRC)
- ADO - ActiveX Data Objects
- ADPCM - Adaptive Differential Pulse-Code Modulation
- ADPCM - Adaptive Digital Pulse Code Modulation
- ADSL - Asymmetric Digital Subscriber Line
- ADSL - Asymmetric Digital Subscriber Line
- AEP - Apple talk Echo Protocol
- AES - Advanced Encryption Standard (quoted from Packet Storm Security - the
- AES will be the eventual replacement for DES. It's a 128-BIT block cipher
- with key lengths of 128, 192, and 256 BITs)
- AF - Audio Frequency
- AFAIK - As Far As I Know (mainly used in IRC)
- AFK - Away From Keyboard (mainly used in IRC)
- AFS - Andrew File System
- AGNPAC - Alberta Government Packet Switched Network
- AGP - Accelerated Graphics Port
- AGP - Advanced Graphics Port
- AI - Artificial Intelligence
- AIFF - Audio Interchange File Format
- AIM - AOL Instant Messenger (a competitor to ICQ)
- AIN - Advanced Intelligent Network
- AIX - Advanced Interactive eXecutive (A version of UNIX)
- AJ - Ask Jeeves (a cool search engine. Ask it any question that has the
- answer to it somewhere on the web and it'll answer. But watchit, he's got
- bad breath... lol... http://www.aj.com)
- AL - Artificial Life
- ALGOL - ALGOrithmic Language
- ALRU - Automatic Line Record Update
- ALU - Arithmetic-Logic Unit
- AMC - ATI Multimedia Channel (a nice connector that can be placed on the
- back of your computer. If you use ATI products then as soon as a new add-on
- comes out, like a new TV-Tuner or something, you can just plug it into the
- AMC)
- AMPS - Advanced Mobile Phone Service
- AMV - Advanced Mail list Verify (http://www.elcomsoft.com/amv.html)
- AN - Associated Number
- ANI - Automatic Number Identification
- ANS - Advanced Network System
- ANSI - American National Standards Institute
- ANSIR - Awareness of National Security Issues and Response
- AO - Anti Online (http://www.antionline.com)
- AOE - Age Of Empires (a strategy game by Microsoft's game development
- division. Some people consider it the best strategy game ever, or at least
- one of the best. Obviously, they're all a bunch of pee-brained drooling
- maniacs. No offense, but I personally think this game... umm... what's that
- word? Oh, yeah... SUCKS!!!)
- AOL - America OnLine
- AOP - Auto OP (if you're an AOP of a channel it means you automatically
- receive OP whenever you enter than channel)
- APA - All Points Ahead
- API - Application Program Interface (an interface used to program
- applications. It is a part of an OS that gives applications an identical
- user interface)
- APL - A Programming Language
- APM - Advanced Power Management
- APNIC - the European and Asia Pacific registries
- APP - Application
- APPC - Advanced Program to Program Comunication
- APPROX - Approximately
- APT - About Phreakin Time (a security-related magazine.
- http://www.net22.freeserve.co.uk/apt)
- ARCNet - Attached Resource Computer Network
- ARE - Acronym-rich environment (mainly used in IRC)
- ArKey / AK - Argued Key
- ARP - Address Resolution Protocol (gives addresses to workstations on a
- local network)
- ARPA - Advanced Research Projects Agency (see ARPANet)
- ARPANet - Advanced Research Projects Agency Network (a computer network that
- was established by the army in the late 60s for research and military
- purposes and eventually mutated into today's Internet, once it became open
- for the masses in the early 90s)
- ARSB - Automated Repair Service Bureau
- ART - Advanced Registry Tracer (http://www.elcomsoft.com/art.html)
- AS - Autonomous System / Address Strobe / Half an A-Level
- ASA - Advanced SCSI Architecture
- ASCII - American Standard Code for Information Interchange / Advanced Small
- Computer Systems Interface
- ASI - Asynchronous SCSI Interface
- ASIC - Application Specific Intergrated Circuit
- ASIN - Amazon Standard Item Number (every Amazon.com affiltrate knows that
- every item (a music CD, a book or a video) has an ASIN. If you want to
- recommend about books, music CDs or videos in your website and then let your
- visitors to buy it all you have to do is to subscribe to Amazon.com's
- affiltrates program (there's a link to yet in their home page) and then find
- the ASIN of the product of your choice and follow their instructions)
- ASIO - Australian Security Intelligence Organization
- ASM / AS - Anti-Social Magazine (a well known hacking magazine)
- ASP - Active Server Page (by Micro$oft. Kinda like a dynamic web page. For
- example: it can receive parameters from you, such as stocks you want to look
- up, and it will display them with nice graphs next to them or something)
- ASPI - Advanced SCSI Programming Interface
- ATA - Advanced Technology Attachment
- ATAPI - ATA Packet Interface
- ATH - Abbreviated Trouble History
- ATL - Active-X Template Library
- ATM - Asynchronous Transfer/Transmission Mode / At The Moment (mainly used
- in IRC) / Automatic Teller Machine (those machines at banks who give you money
- in exchange for plastic cards and may sometimes eat your card if you've been
- naughty and spent all of your allowance. Naughty, naughty!)
- ATP - Apple Talk transaction Protocol
- ATRAC - Adaptive TRansform Acoustic Coding
- ATTRIB - Attribute
- AUI - Attachment Unit Interface
- AUP - Acceptable User Policy
- AURP - Apple talk Update-based Routing Protocol
- AVI - Audio Visual Interface (an extremely lame computer video format, used
- mainly by Micro$oft... Surprise, surprise)
- AVP - Aliens Vs. Predators (an online multiplaying game)
- AW97PR - Advanced Word 97 Password Recovery (see
- http://www.elcomsoft.com/aw97pr.html)
- AWG - American Wire Gauge
- AZ - Abstract Zero (a hacking group, now in the ownership of PE (Pirated
- Education))
- b - BIT
- B - Byte
- B4 - Before (mainly used in IRC)
- B4BO / B4B0 - Bah Boh (a cool hacking magazine. www.b4bo.org)
- B4N - Bye for now (mainly used in IRC)
- BAK - Back at the keyboard (mainly used in IRC) / Backup (An extension often
- used under DOS to mark backup copies of files)
- BASH - Bourne Again Shell (a Unix shell. Usually located at /bin/bash)
- BASIC - Beginner's All Purpose Symbolic Instruction Code (a programming
- language) / Bill's Attempt to Seize Industry Control ;)
- BAT - Batch (a batch file is a plain text file that consists of commands
- that will be sent to the command prompt whenever the file is executed)
- BB - Big Brother ((as described by Packet Storm Security) Big Brother is a
- combination of monitoring methods. Unlike SNMP where information is just
- collected and devices polled, Big Brother is designed in such a way that
- each local system broadcasts it's own information to a central location.
- Simultaneously, Big Brother also polls all networked systems from a central
- location. This creates a highly efficient and redundant method or proactive
- network monitoring. It also has blinking lights that make it look really
- cool. Features: Web-based status display, Configurable warning and panic
- levels, Notification via Pager or email, Support for grouping of machines,
- support for modem monitoring, Selectable paging delays, Heterogeneous
- Network Support. Monitors: dns nntp ftp smtp and pop3 testing, connectivity
- via ping, http servers up and running, disk space usage, uptime and cpu
- usage, essential processes are still running, messages and warnings. By Sean
- MacGuire)
- BBAS - Beige Box Advanced System
- BBIAB - Be back in a bit (mainly used in IRC)
- BBL - Be Back Later (mainly used in IRC)
- BBN - Bye Bye Now / Bolt Beranek and Newman
- BBNW - BB for NetWare
- BBS - Bulletin Board System
- BCAS / B-CAS / BKAS / B-KAS - Because (mainly used in IRC)
- BDR - Bus Device Request
- BEDO DRAM - Burst Extended Data Output DRAM
- BEG - Big evil grin (mainly used in IRC)
- BFD - Big fucking deal (mainly used in IRC)
- BFN - Bye for now (mainly used in IRC) / Big Freakin' Number (mainly used in
- IRC)
- BG - Big grin (mainly used in IRC)
- BGP - Border Gateway Protocol
- BIN - Binary
- BIOS - Basic Input/Ouput System
- BIOYIOP - Blow it out your I/O port (mainly used in IRC)
- BIT - BInary digiT
- BITNET - Because It's Time Network
- BL - Belly laughing (mainly used in IRC)
- BLN - Black Lava Networks (http://bln.cjb.net)
- BMP - BITmap (a basic image file)
- BNC - Bouncer
- BNET - Battle Net (Blizzard's multiplayer gaming arena. www.battlenet.com or
- www.blizzard.com)
- BO - Back Orifice (one of the most famous Remote Administration trojans,
- made the CDC. Once you run the server file, anyone with the client program
- or a simple telnet application can access your computer. Basically it
- installs a backdoor on your computer. The backdoor can be locked with a
- password so only the person who sent you the server file in the first place
- can access the backdoor. OK, unless the password gets mysteriously hacked...
- the server file only works on Windows but the client works from either
- Windows or UNIX. The UNIX version is open-source. BO and NB are the two most
- common trojans. While NB is super simple, BO is a little more complicated
- but is still lame)
- BO2K - Back Orifice 2,000 (another version of BO by cDc)
- BOC - Bell Operating Company
- BOD - BO Detect (one of the best BO detection programs.
- http://www.spiritone.com/~cbenson/distributables/BoDetect_StandAlone.zip)
- BOE - BO Eliminator (one of the best BO detection programs. If you know the
- URL, please contact R a v e N at barakirs@netvision.net.il)
- BOF - Buffer Overflow
- BOR - Basic Output Report
- BOSS - Business Office Servicing System
- BOTEC - Back-of-the-envelope calculation (mainly used in IRC)
- BOW - Brotherhood Of Warez (a parody e-zine of "warez d00dz" and "h4x0rs"
- alike, which could be compared to "Da H4x0r BrUdAz (see jargon dictionary,
- www.fwi.uva.nl/~mes/jargon/))
- BPI - Bytes Per Inch
- BPP - Bytes Per Pixel (how many bytes are needed to define the color of a
- single pixel (a dot). 8 BPP gives you a maximum color palette of 256 colors,
- 16BPP is 65530 (or a similar number... I keep forgetting this number), etc'
- etc')
- BPS - Bytes Per Second (the amount of bytes that are transferred per second
- on the current connection speed)
- BPX - Break Point on eXecution
- BRB - Be Right Back (mainly used in IRC and ICQ)
- BS - Black Sun (see BSRF)
- BSA - Business Software Alliance
- BSC - Binary Synchronous Communication protocol
- BSD - Berkeley Software Distribution
- BSH - Bourne Shell (a Unix shell. Usually located at /bin/bsh or /bin/old/sh
- or /usr/bin/old/sh)
- BSOD - Blue Screen Of Death
- BSRF - Black Sun Research Facility (our website. blacksun.box.sk)
- BTA - But then again... (mainly used in IRC)
- BTW - By The way (mainly used in IRC and ICQ)
- BW / B&W / B/W - Black and White (usually referred to monitors or pictures,
- meaning black and white monitors or black and white pictures)
- BWC - Because We Can
- BX - BitchX (an IRC client. http://www.bitchx.org)
- C - See (mainly used in IRC)
- C&C - Command & Conquer (a series of strategy games by Westwood. Considered
- to be the best of it's kind)
- C&C: RA / C&CRA / RA - Command & Conquer: Red Alert (a game in the C&C
- series. See C&C)
- C&C: TS / C&CTS / TS - Command & Conquer: Tiberian Sun (a game in the C&C
- series. See C&C)
- CA - Cable / CERT Advisory
- CAB - Cabinet file (it's some type of a compression Micro$oft often use, not
- to confuse with InstallShield CAB files)
- CAD - Computer-Aided Design
- CAF - Crackers Against Fakes (a hacking group)
- CALC - Calculator
- CALEA - Communications Assistance for Law Enforcement Act
- CAM - Common Access Method
- CAM - Computer Aided Manufacturing
- CAPS - Computer-Assisted Passenger Screening (computer programs that go over
- all the passengers lists and compares them with terrorists' profiles. If a
- passenger matches or is chosen at random "extra care" will be given to his
- luggage)
- CARPC - Connected Car PC (Intel's attempt to take over the car industry.
- It's like a car with tons of computers and stuff in it. You know,
- satellites, Internet access, TV... ahh, the good life)
- CATE - Computer Aided Test Engineering
- CATS - Computer Assistance, Training and Services Inc
- CBM - CAM-Brain-Machine
- CC - C Compiler / Carbon Copy / Credit Card
- CCC - Chaos Computer Camp (a hacking convention. Everything from hacking to
- lock picking)
- CCD - Charge-Coupled Device
- CCi / CCI - Cybercrime International (a hacking group)
- CCS - Common Command Set
- CD - Compact Disc / Change Directory (a command used both in UNIX and DOS.
- Usage: cd directory will get you to that directory. If there is a sub
- directory called foobar on your current directory (the directory you are in
- right now) the command cd foobar will get you there (this is called a
- relative path). You can also use cd like this: cd /etc to get to /etc on
- UNIX or cd windows/system to get to windows/system on DOS (supposing there
- are such directories))
- CDA - Computer Decency Act
- CDC / cDc - Cult of the Dead Cow (a hacking group. Famous for their
- Unix/Windows to Windows remote administration trojan, BO)
- CDE - Common Desktop Environment
- CDEV - Control panel DEVice (Mac)
- CDI - Compact Disk Interactive
- CDR - Coreldraw DRawing / Compact Disc Recorder (a cd burner)
- CDROM - Consumer Device, Rendered Obsolete in Months ;)
- CDRW - Compart Disk ReWriteable (most CD burners can't write on parts of a
- CD that were already written on, because a CD burner is basically a laser
- that burns tiny little holes into the CD. But not a CDR. A CDR can rewrite
- on such areas, but only on special CDs, also called CDRs)
- CDW - Compact Disk Write (a CD burner)
- CELP - Cache Enabled Low Profile
- CELP - Code Excited Linear Prediction
- CERT - Computer Emergency Response Team (a hackers website with exploits,
- archives and advisories)
- CESA - Cyberspace Electronic Security Act
- CFG - Configuration
- CFS - Cryptographic File System
- CGA - Color Graphics Adapter (one of the first color monitor. Supports 4
- colors) / Computer Generated Animation (what's there to say? Any kind of
- animation, 2D or 3D, which has been created by a computer)
- CGI - Common Gateway Interface (it's a way for users to submit requests and
- have the server perform some functions, typically a function that is native
- to the OS of the system, to either send a more "dynamic" response to the
- user, or to gather information about the user)
- CGM - Computer Graphics Metafile
- CHAP - Challenge Handshake Authentication Protocol
- CHECKSUM - Summation Check
- CHMOD - Change Mode (a UNIX command. If you own a file you can set the
- permissions for it. For more info type man chmod)
- CHOWN - Change Owner (a UNIX command. If you own a file you can make someone
- else the owner but you will lose ownership of that file unless you are root.
- Owning a file means that not only if someone will check who owns that file
- it'll show your username, it also means that you can run chmod on it etc'
- etc'. If you don't own a certain file, you can read, write or execute it
- only if the owner lets you. For more info, type man chown)
- CIR - Committed Information Rate
- CIS - Compuserve Information Services
- CISPPP - Compuserve Information Services Point to Point Protocol
- CIV - Civilization (a series of computer strategy and development games by
- Sid Meiers. Considered to be the best series of strategy and development
- games on the galaxy. The company that distributes this game is Activision)
- CIV:AC / CIVAC / AC - Civilization: Alpha Centaury (a part of the CIV
- series. See CIV)
- CIV:CTP / CIVCTP / CTP - Civilization, Call To Power (the only game in the
- CIV series that really stinks)
- CIVII - Civilization II (see CIV)
- CJ - Cracker Jack (a Unix password cracker)
- CLI - Command Line Interface (an interface that is based on text and was
- planned to be operated using nothing but a keyboard (although in today's
- CLIs, such as in modern Unix text shells) you can also use the mouse to
- copy-and-paste text by highlighting some text and then pressing the middle
- mouse button or shift+right mouse button in case you don't have a middle
- mouse button and turned middle mouse button emulation on, which will cause
- the highlighted text to be pasted into the position of your cursor)
- CMC - Construction Maintenance Center
- CMD - Command
- CMEINEL - Carolyn Meinel (see www.happyhacker.org)
- CMOS - Complementary Metal Oxide Semiconductor
- CMP - Computer Maintance Port
- CMYK - Cian Magenta Yellow blacK
- CNID - Calling Number IDentification
- CO - Central Office
- COAS - Caldera Open Administration Tool
- COBOL - Common Business Oriented Language (a programming language) /
- Completely Obsolete Business Oriented Language ;)
- COCOT - Customer Owned Coin Operated Telephone
- COE - Central Office Equipment
- COM - Component Object Model / Command (when referring to DOS filename
- extensions)
- COMP - Computer
- CON - Convention / Conference
- CONF - Confidential / Configuration / Configure
- CONFIG - Configuration
- COPA - Child Online Protection Act
- COSMOS - Computer System for Main Frame Operations
- COTM - Code Of The Month
- CP - Copy
- CPC - Cost Per Click (suppose you have a website and you get some sponsors
- to put their banners in it. Now, one of the paying methods is CPC, meaning
- you get paid a couple of cents whenever someone clicks on a banner on your
- website)
- CPH - Common Purpose Hackers (a hacking group. http://8op.com/cphackers)
- CPM - Cost Per Media (the amount of money you have to pay per exposures when
- advertising on the net. This can change according to several extremely
- boring factors)
- CPP - C Plus Plus (a programming language)
- CPU - Central Processing Unit
- CR - Carriage Return (a system character used by DOS and DOS-based OSs (such
- as Winblows). It is a special ASCII character called Carriage Return which,
- when followed by an LF (Line Feed) char, means "end of line" in a
- DOS/Windows text file)
- CRAN - Corporation For Research And Educational Networking
- CRC - Cyclic Redundancy Check (when you extract a compressed/archived file,
- your extracting program will make sure that the number of characters in the
- extracted file is identical to the number of characters the same file had
- before it was compressed. This is called a CRC)
- CRSAB - Centralized Repair Service Answering Bureau
- CRT - Cathode Ray Tube (a very common type of computer monitors)
- CRYPTO - Cryptography
- CS - CompuServe (see CSERVE) / Computer Science
- CSERVE - CompuServe (an ISP with it's own little network, as well as
- Internet access. Kinda like AOL, only it doesn't suck that much)
- CSH - C Shell (no, it doesn't have anything to do with sea shells. Just
- another Unix shell. Usually located at /bin/csh)
- CSS - Cascading Style Sheet
- CSU - Computer Surplus Outlet
- CTCP - Client To Client Protocol (
- CTCPEC - Canadian Trusted Computer Product Evaluation Criteria
- CTIME - Change Time
- CTR - Click Through Rate
- CU - See you (mainly used in IRC)
- CUD - Computer Underground Digest (a security-related e-zine
- (Electronic-Magazine))
- CUDN - Common User Data Network
- CUL - See you later (mainly used in IRC)
- CUL8ER - See you later (mainly used in IRC)
- CUR - Cursor
- CWD - CyberWare Dispatch
- CYA - Cover your ass / See ya (mainly used in IRC)
- CYMK - Cyan Yellow Magenta blacK
- CYO - See you online (mainly used in IRC)
- D - Daemon (HTTPD = HTTP Daemon, FTPD = FTD Daemon, SMTPD = SMTP Daemon
- etc') / Demo (a demonstration version of some kind of a software. A demo
- software would contain limited options, a demo game would contain only a
- couple of levels, etc')
- D/C - Disconnect
- DA - Download Accelerator
- DACL - Discretionary Access Control List
- DAO - Data Access Objects
- DARK-E / DARKE - Dark Eclipse Software (http://www.dark-e.com)
- DARPA - Defense Advanced Research Projects Agency
- DAT - Data
- DB - Database
- DBA - Doing Business As (mainly used in IRC)
- DBCS - Double Byte Character Set
- DBMS - Database Management Systems
- DC - Differentiating Current / Disconnect / Device Coordinates
- DCB - Disk Coprocessor Board
- DCC - Direct Cable Connection / Direct Card Calling / Direct Client
- Communication (used to transfer files in IRC)
- DCOM - Distributed.com
- DD - Double Density (a type of a floppy disk)
- DDD - Direct Distance Dialing
- DDE - Dynamic Data Exchange
- DDL - Direct Devide Library
- DDN - Defense Data Network (USA's network of military and defense networks)
- DDP - Datagram Delivery Protocol
- DDS - Direct Digital Sampling
- DDX - Dialog Data Exchange
- DEC - Do Expect Cuts ;) / Digital Equipment Corporations
- DEEP / dEEP - Drinking Evil Elite Phreakers (d33p.base.org)
- DEF - Default
- DEFCON - DEFense CONdition / DEF CONvention (a hackers convention held each
- year on Las Vegas)
- DER - Distinguished Encoding Rules
- DES - Data Encryption Standard
- DESC - Description
- DFLA - Disenhanced four-letter acronym (that is, a TLA) (mainly used in IRC)
- DFS - Disk filing System (what old acorns and BBC's used to handle floppy
- disks
- DHC - Delinquent Hacking Corporation (http://dhc1.cjb.net)
- DHCP - Dynamic Host Configuration Protocol
- DHP - Data Haven Project (http://dhp.com)
- DHTML - Dynamic HTML
- DIB - Device Independent Bitmap
- DIC - Dictionary
- DIG - Domain Internet Groper
- DIKU - Do I know you? (mainly used in IRC)
- DISA - Defense Information System Agency
- DISC - Disconnection / Disconnecting (mainly used in IRC)
- DISTRO - Distribution
- DITYID - Did I tell you I'm distressed? (mainly used in IRC)
- DL / D/L - Download
- DLL - Dynamic Link Library (an application extension, loaded and unloaded
- automatically by applications during it's execution. The beauty in DLLs is
- that they can be unloaded when they're not necessary anymore to free up some
- memory and can also be shared betweens programs to free up some HD space)
- DND - Do Not Disturb (mainly used in IRC and ICQ)
- DNS - Domain Name Service
- DOLM - Date Of Last Change
- DoS - Denial of Service (not to be confused with DOS. A DoS attack is
- basically a way to prevent a person from using one, several or all the
- services that his computer offers. The most popular (and lamest) DoS attack
- is winnuke, which can be launched from Windows or Unix and can crash your
- Win95 box unless you've got a patch against it. It is considered lame
- because it's very easy to launch and the chances that your target is
- unpatched are very small)
- DOS - Disk Operating System (all older OSs were loaded from the BIOS.
- Correct me if I'm wrong) / Defective Operating System ;)
- DP - Data Package
- DPI - Dots Per Inch
- DPMS - Desktop Power Management System
- DPS - Dead Protocol Society (a hacking group)
- DQMOT - Don't quote me on this (mainly used in IRC)
- DRAM - Dynamic RAM
- DRDRAM - Direct Rambus DRAM
- DRV - Driver (a file that contains necessary information for an OS to use a
- certain devide on your computer)
- DSL - Digital Subscriber Line(loop) (A family of digital telecommunications
- protocols designed to allow high speed data communication over the existing
- copper telephone lines between end-users and telephone companies)
- DSS - Decision Support System / Darkridge Security Solutions
- DTMF - Dual Tone Multi Frequency
- DUN - Dial Up Networking (this little winblows program that gets you on the
- internet. Win95 comes with version 1.1 but is upgradable while 98 comes with
- 1.3. Go search micro$oft.com for differences, FAQs and downloads. DO NOT
- install over win95 unless you're completely certain you want to do this)
- DV - Digital Videotape
- DVD - Digital Video Disc
- DW - Disc World (a rather large series of books, two computer adventure-game
- and a TV show. Very funny! Go get the game)
- DWII - Disc World II (the sequel to the computer adventure-game Disc World.
- See DW above)
- E - Error
- EA - Electronic Arts
- EASI - Enhanced Asynchronous SCSI Interface
- EAX - Environmental Audio Expansion
- EBCDIC - Extended Binary Coded Decimal Interchange Code
- ECC - Enter Cable Change / Elliptic Curve Cryptosystem
- ED - Editor
- EDO - Extended Data Out
- EFF / EFFNet - Electronic Freedom Foundation Network (see http://eff.org)
- EFNet - Eris Free Network (the famous (and one of the oldest) IRC server. It
- is reputed as a "war ground" for IRC wars (flooding, channel takeovers,
- kicking people you don't like off IRC or a specific channel/channels,
- "nuking" people etc') since you are allowed to do whatever you want but you
- may not like what others might do to you... ;) more info on IRC and other
- IRC servers at www.irchelp.com)
- EFR - Enhanced Full Rate
- EFS - Encrypting File System
- EG - Evil grin (mainly used in IRC)
- EG Hackers / EG-Hackers / EGHACKERS - United Egyptian Hackers (another lame
- hacking page. www.angelfire.com/nf/eghackers/eghackers.html)
- EGA - Enhanced Graphics Adapter (a monitor which supports 16 colors)
- EGD - Entropy Gathering Daemon ((Taken From Packet Storm Security) a
- standalone daemon that sits around running various statistics collection
- programs (ps, vmstat, iostat, etc). It hashes the results into an "entropy
- pool". If things happen on your system at relatively random and
- unpredictable times, then some of that randomness will become a part of the
- entropy pool and can be used to egnerate random numbers. It is basically a
- user-space implementation of the Linux kernel /dev/random device. As such,
- it should be runnable on all Unix-like systems. It is intended to make up
- for the lack of /dev/random on non-Linux systems so that programs like GPG
- can be used safely. Made by brian Warner)
- EGP - Exterior Gateway Protocol
- EGREP - Extended GREP
- EIA/TIA-232 - Eletronic Industries Assoation/Telecommunication Industry
- Association Recommended Standered 232
- EJM - Expert Judgement Model
- ELF - Extremely Low Frequency
- E-MAIL - Electronic Mail
- EMFBI - Excuse me for butting in (mainly used in IRC)
- EMI - Electro-Magnetic Interface
- EMM - Expanded Memory Manager
- EMP - Electro Magnetic Pulse
- EMS - Extra Memory Specifications
- EMU - Emulator (a program that emulates something. For example: a Linux
- emulator for Windows allows you to run Linux from Windows. Unfortunately
- most EMUs are unstable and aren't very "complete")
- ENCAP - IP Encapsulation Protocol
- E-NUF / ENUF - Enough (mainly used in IRC)
- EOA - End Of Article
- EOC - End Of Commentary
- EOD - End Of Diatribe
- EOF - End Of File
- EOM - End of message (mainly used in IRC)
- EOT - End of thread/transmittion (meaning: end of discussion) (mainly used
- in discussion groups and IRC)
- ERC - Encrypted Relay Chat
- ERR - Error
- ERRPT - Error Report
- EST - Enigma's Setup Trojan (yet another lame Windows remote administration
- trojan, made by Enigma. Once you run the server file, anyone with the client
- program or a simple telnet application can access your computer. Basically
- it just opens a backdoor on your computer. The backdoor can be locked with a
- password so only the person who sent you the server file in the first place
- can access the backdoor. OK, unless the password gets hacked, of course. The
- only special thing about this trojan is that it is hidden within a "setup
- program". Both the server and the client are to be executed from Windows
- 95/98)
- ETLA - Extended three-letter acronym (that is, an FLA) (mainly used in IRC)
- EULA - End User License Agreement
- EWS - Excite for Web Servers
- EXE - Executable (an executable file is a program that you can run and not
- only view like text files and pictures)
- EXT - Extension / External
- E-ZINE - Electronic Magazine (a magazine that is publised on the net instead
- of on paper)
- F2F - Face to face (mainly used in IRC)
- FACCI - Florida Association of Computer Crime Investigators
- FAQ - Frequently Asked Questions
- FAQE - Fake or unture FAQ
- FAT - File Allocation Table (a small part in your HD that you cannot write
- to, which contains the location of every file/directory/sector in your HD
- and changes according to changes in your HD's structure. For example: when
- you delete a file, write a new one, move a directory etc' it changes the FAT
- according to the changes you've made)
- FCP - [SCSI-3] Fibre Channel Protocol
- FDD - Floppy Disk Drive
- FDO - Form Display Operation
- FIDT - Federal Intrusion Detection Network
- FIFO - First In First Out
- FIN - Finish (suppose you send someone some pieces of data using the TCP
- protocol. Once you're done, your computer is supposed to send a TCP packet
- with the FIN flag on. Once the computer on the other end will receive it, it
- would know not to expect any more packets from you. This means that the
- sending process is complete and all of the packets will be forwarded to the
- application that has requested them in the first place (example: an Internet
- browser) or is supposed to receive them (example: an instant messenger
- program such as ICQ). More info at the entry TCP)
- FingerD - Finger Daemon
- FISH - First in, still here (mainly used in IRC)
- FLA - Four-letter acronym (mainly used in IRC)
- FMTYEWTK - Far more than you ever wanted to know (mainly used in IRC)
- FOLDOC - Free On-line Dictionary of Computing (I quote: "FOLDOC is a
- searchable dictionary of acronyms, jargon, programming languages, tools,
- architecture, operating systems, networking, theory, conventions, standards,
- mathematics, telecoms, electronics, institutions, companies, projects,
- products, history, in fact anything to do with computing."
- http://wombat.doc.ic.ac.uk/)
- FOMCL - Falling off my chair laughing (mainly used in IRC)
- FORTRAN - FORmula TRanslation lANguage (a programming language)
- FOTW - Fringe Of The Web (a website that lists the "top" 100 H/P/V/C/A
- sites. Mostly script-kiddies sites though)
- FP - FrontPage (a lame website degisner by Micro$oft)
- FPS - Frames Per Second
- FPSE - FrontPage Server Extensions
- FQDN - Fully Qualified Domain Name
- FREE - the Forum for Responsible and Ethical Email
- FS - File System
- FSCK - File System Check
- FSTAB - File System Table (the /etc/fstab file on Unix contains a list of
- file systems that are present and some crucial information on them that is
- required for mounting)
- FTP - File Transfer Protocol
- FTPD - FTP Daemon
- FU - Fuck You (mainly used in IRC)
- FUBAR / FOOBAR - Fucked up beyond all repair or recognition (mainly used in
- IRC)
- FU2B / FUTB - Fuck You Too, Bitch (mainly used in IRC)
- FUD - Fear, Uncertainty, and Doubt (mainly used in IRC)
- FWIW - For What It's Worth (mainly used in IRC)
- FY - Fuck You (mainly used in IRC)
- FYI - For your information (mainly used in IRC)
- G / <G> - Grin (mainly used in IRC)
- GA - Go ahead (mainly used in IRC)
- GAL - Get a life (mainly used in IRC)
- GB - GigaByte (1,000 MBs)
- GCC - Gnu C Compiler
- GD&R - Grinning, ducking, and running (mainly used in IRC)
- GDI - Graphical Device Interface
- GFN - Good For Nothing
- GFX - Graphics
- GGP - Gateway-Gateway Protocol
- GGREP - GNU GREP (GNU's version of the popular Unix tool, GREP)
- GH / gH - Global Hell (a hacking group. They're in war with the FBI. Man,
- they're really giving the feds a hard time. They DoSsed their servers and
- some other .gov servers a couple of times, ya know)
- GIF - Grapics Interchange Format
- GIMP - GNU Image Manipulation Program
- GIS - Geographic Information Systems
- GIWIST - Gee, I wish I'd said that (mainly used in IRC)
- GL - Good Luck (mainly used in IRC)
- GM - Game Master
- GMTA - Great Minds Think Alike (mainly used in IRC)
- GMV - Got My Vote (used a lot in online games such as Bezerk's Acrophobia.
- See http://www.won.net/bezerk)
- GMX - Global Message Exchange (a free Email provider. http://www.gmx.net)
- GNOME - GNU Network Object Model Environment (a Window Manager for Linux)
- GNU - GNU's Not Unix (GNU is the largest open-source project, which was
- founded by Richard Stallman from MIT. Since Unix itself is copyrighted by
- AT&T, they called GNU that way. By the way, Linux is not copyrighted, and it
- is part of the GNU project as well. Anyway, open-source programming means
- free software that even comes with the source, so everyone will be able to
- improve it and fix security holes and suchlikes).
- GOAT / GoA,T / GoAT - Go Away, Troll
- GODMN - God Damn (mainly used in IRC)
- GOL - Giggling out loud (mainly used in IRC)
- GOV - Government (when referring to URL extensions)
- GPF - General Protection Fault (kinda like a program crash)
- GPL - General Public License (if a program is a GPL program, it means that
- everybody has the license to use and/or change the program, hence it is
- open-source, and can redistribute this program, as long as he doesn't credit
- himself for it)
- GPP - [SCSI-3] Generic Packetized Protocol
- GPS - Global Positioning System
- GRAPHX - Graphics
- GREP - Global Regular Expression Print (a famuos Unix utility, comes with
- all Unix variants. Basically it searches for a given string in a given
- file/files, but it can do a lot more than that)
- GRL - Girl (mainly used in IRC)
- GRRL - Girl (mainly used in IRC)
- GSD - Get Service Dacl
- GTG - Got to go / Gotta go
- GTMHH / GT(M)HH / G2MHH / G2(M)HH - Guides To (Mostly) Harmless Hacking (a
- legal-hacking guide for complete newbies by Carolyn Mainel.
- http://www.happyhacker.org)
- GTP / GTP? - Get The Picture? (mainly used in IRC)
- GTRM - Going to read mail (mainly used in IRC)
- GU - Glide Underground
- GUI - Graphical User Interface (a GUI is like what Windows is to DOS or what
- X-Windows is to UNIX)
- GUID - Global Unique ID
- GW - Gateway (did you ever wonder how your ISP works? Well, you connect to
- your ISP by dialing to it, by connecting through some sort of a cable or by
- calling them on the phone and humming all those nifty modem sounds (not
- recommended) and they connect you to the internet through their connection
- to internet backbones. This is called a gateway. For those who remember the
- good old BBS days you might remember another type of gateway. Suppose you
- had a modem which was set to auto answer incoming calls. You could have
- programmed a gateway so whenever someone dials your number and your modem
- answers it will display a logo or give the person a menu etc'.)
- HAFTA - Have To (mainly used in IRC)
- HAO / HaO - Hackers Associated Online (taken from www.projectgamma.com:
- Title: Calling all K-RAD haxors. May 3, 1999, 23:26. Author: WHiTe VaMPiRe.
- Yes, you have waiting long and hard, that time spent will finally be paid
- off! Hackers Associated Online (HaO) is now accepting members!@!$ Pull out
- that dust covered winnuke, your copy of AOHell and UpYours; they will
- finally be put to use. Yes, you read correctly, HaO is accepting members.
- You will finally be just as er33rt and f33red as the true elites, move over
- I-L and #feed-the-goats, it is HaO; they take no prisoners! HaO was founded
- "to create a safe arena for information exchange"; only if you join and get
- access to their members' section, that is. Quick! Send in your application
- now, because "Not everyone that applies will be accepted into the
- organization." But beware, they have hard questions and high requirements if
- you wish to be a member of this motley crew. You have to answer such brain
- boggling questions, such as, "What is a BIOS?", "Who wrotethe 'Hacker's
- Manifesto'?", and "What command do you type to get a directory listing in
- Linux?" (I think they mean "folder"). Be a hax0r, be a man, and be part of
- HaO)
- HARP - Hackers Against Racist Parties
- HB - HyperBanner (kinda like LE. Has it's own advantages and disadvantages)
- HBA - Host Bus Adapter
- HC - Hackcity (4/5s of script-kiddizm but a nice 1/5 of hacking. Oh, yeah,
- and they claim to have "ethics". If you have ethics why do you offer your
- visitors nukes and trojans? "For educational purposes"? Yeah, right... most
- of the staff are real lamers (especially Hadez). The rest are semi-lame...
- hehe... www.hackcity.com)
- HCL - Hardware Compatibility List
- HD - HardDisk / HardDrive. Can also mean High Density, if refering to a
- floppy disk. Other XD terms include: DD - Double Density, SD - Single
- Density.
- HDC - Hackers.com (a cool website for hackers. Has all sorts of interesting
- features and rare files
- HDD - HardDisk Drive
- HDSL - High BIT-rate Digital Subscriber Line (see DSL)
- HELLUVA - Hell-Of-A... (mainly used in IRC)
- HERF - High Energy Radio Frequency
- HERFW - HERF Weapon
- HFC - HellFire Club (a hacking group)
- HGL - Hewlett packard Graphics Language
- HH - Happy Hacker (a website, a mailing list and a hackers wargame for
- newbies. A great place to start IMHO. www.happyhacker.org) / Hackersclub (a
- cool BBS-like website with a good library. www.hackersclub.com)
- HINFO - Hardware/software INFOrmation
- HIR - Hacker Information Report (yet another E-zine. Rather interesting,
- though. http://axon.jccc.net/hir)
- HIU - Hack It Up (a hacking website/group.
- http://homepages.hack-net.com/vault/hiu/)
- HL - Half Life (the best first person shooter game in the world in R a v e N
- and F a n g's opinion)
- HLS - Hue Lightness Saturation
- HLT - Halt (all modern CPUs have an HLT option. This means your CPU turns
- itself off for milliseconds or more, depending on several factor, to cool
- itself down. Unfortunately, Windows 95 nor 98 don't support this option so
- you have to download a program called CPUIdle from www.litestep.org. More
- info in CPUIdle's readme files)
- HMP - Host Monitoring Protocol
- HNC - HackNet.com (a hacking group. They also give away free webspace for
- hacking-related sites (but no porn/warez crap). www.hacknet.com)
- HNN - Hacker News Network
- HOMER - Heuristic Overview of Matrix Expansion and Reconstruction (a
- story-telling AI from the wonderful 80s computer game "Portal". Quote: "...I
- come from times of acronyms...")
- HOPE - Hackers On Planet Earth
- HP - Hewlett Packard (American/English Manufacturer of good Computers/the
- best printers) / #Hackphreak (a lame undernet channel full of lame script
- kiddies)
- HPFA - High Performance System (OS/2)
- HPVCA / H/P/V/C/A - Hacking/Phreaking/Virii/Carding/Anarchy
- Hr / HR - hour
- HRZ - Horizontal
- HSB - Hue Saturation Brightness
- HSV - Hue Saturation Value
- HTH - Happy To Help / Hope This/That helped (mainly used in IRC)
- HTML - Hyper Text Markup Language
- HTP - Hack The Planet (some hacking group. http://www.htp.com)
- HTTP - Hyper Text Transfer Protocol
- HTTPD - HTTP Daemon
- HTTPSR - HTTP Server
- HU - Hacker's Utility (a famous hacking utility)
- HUP - Hang-Up Process
- HVD - High Voltage Differential
- Hz / HZ - Hertz
- IAB - Internet Activities Board
- IAC - In any case (mainly used in IRC)
- IACR - International Association for Cryptographic Research
- IAE - In Any Event
- IAL - Internet Address List
- IANAL - I Am Not A Lawyer (but) (mainly used in IRC)
- IBM - International Business Machines (a famous computers company. There's
- no way you havn't heard of it) / I Blame Microsoft ;)
- IBPAG2 - Icon-Based Parser Generation System 2
- IC - In Character (used mainly in MUDs) / Instruction Counter
- IC / I C - I see (mainly used in IRC)
- ICANN - Internet Corporation for Assigned Names and Numbers (a non-profit
- corporation formed by the global Internet community to assume responbisility
- for certain Internet domain name system fuctions, as set forth in the U.S.
- Government's Statement of Policy ('White Paper'))
- iCE / ICE - Insane Creators Enterprise (a lame hacking group)
- ICMB - ICMP Bombing (a DoS attack)
- ICMP - Internet Control Message Protocol (it is used to relay network
- conditions and different errors to IP (Internet Protocol) and other layers)
- ICMPHU - ICMP Host Unreachable (a DoS attack)
- ICO - Icon (a small picture that is used to recognize a file. For example:
- text files will probably have an icon of a note, images will probably have
- the icon of a picture, games will probably have their logo as their icon
- etc')
- ICP - Internet Caching Protocol
- ICQ - I Seek You (not exactly an acronym, but...)
- ICQPC - ICQ Password Cracker (a program by Progenic Warfare
- (www.progenic.com) that cracks locally-stores ICQ passwords)
- ICSD - Information and Computing Sciences Division
- ID - Identification
- IDC - Internet Database Connector
- IDDN - International Digital Defense Network
- IDE - Integrated Drive Electronics (an interface for disk drives)
- IDENT - Identity (not to be confused with the Ident daemon or the INetD
- program)
- IDF - Intel Developers Forum
- IDL - Intrusion Detection Lockout (the best example of an IDL is a program
- that shuts you off and bans you when you try to log into a system and enter
- wrong username/password combinations for three times)
- IDS - Intrusion Detection System
- IDPR-CMTP / IDPRCMTP - IDPR Control Message Transport
- IE - Internet Explorer (Micro$oft's web browser. A good competitor for
- Netscape but has plenty more bugs in it than netscape)
- IEEE - Institute of Electrical and Electronics Engineers
- IETF - Internet Engineering Task Force (a bunch of guys who make up all
- sorts of Internet standards and suchlikes)
- IFS - Input Field Seperator
- IGMP - Internet Group Multicast Protocol
- IHA - I hate acronyms (mainly used in IRC)
- IHN - Internet Host Network (they give away free V3 domains, free web space
- and much much more. www.ihn.org)
- IHU - ICQ Hacking Utilities (a famous and currently-offline website. I
- wouldn't call ICQ Utilities hacking, though)
- IIRC - If I recall/remember/recollect correctly (mainly used in IRC)
- IIS - Internet Information Server (a webserver. If you have a fast
- connection to the internet and a fast and reliable computer with plenty of
- RAM you can install this program and you'll have a webserver on your PC.
- There are several different programs of this type, some are better, some are
- worse)
- IIX - Israeli Internet Exchange
- IL / I-L - Iron Lungs (a member of HcV)
- ILF - Independent Logical File
- ILU or ILY - I love you (mainly used in IRC)
- IM - Immediate message (mainly used in IRC)
- IMAP - Interactive Mail Access Protocol (a protocol used for transferring
- Emails)
- IMDB - Internet Movie DataBase (know the URL? Mail us at
- barakirs@netvision.net.il)
- IMHO - In my humble opinion (mainly used in IRC)
- IMing - Chatting with someone online usually while doing other things such
- as playing trivia or other interactive game (mainly used in IRC)
- IMNSHO - In my not so humble opinion (mainly used in IRC)
- IMO - In My Opinion
- IMP - Interface Message Processor (the Internet's (ARPANet at that time)
- first router)
- iNC / INC - International Network of Crackers (a hacking group)
- INDY - Indigo
- INet - Internet
- INetD - Internet Daemon (there's also a UNIX program called inetd that is in
- charge of taking care of all the daemons and everything related to such
- tasks)
- INSI - International Network Security Inc. (a security-consulting company
- based in Japan)
- INST - Install / Installation
- INT - International (a URL extension. For example: www.nato.int)
- InterNIC - Internet Network Information Center
- IO / I/O - Input/Output
- IOL - Israel OnLine (yes, I am from Israel and I'm proud, dammit! lol.
- http://www.iol.co.il)
- IOW - In other words (mainly used in IRC)
- IP - Internet Protocol (the connectionless, unreliable network protocol in
- the TCP/IP suite. It has two 32-bit header fields to hold address
- information. IP is also the busiest of all the TCP/IP protocols as almost
- all TCP/IP traffic is encapsulated in IP datagrams. IP's job is to route
- packets around the network. It provides no mechanism for reliability or
- accountability, for that, it relies on the upper layers. IP simply sends out
- datagrams and hopes they make it intact. If they don't, IP can try to send
- an ICMP error message back to the source, however this packet can get lost
- as well. IP has no means to guarantee delivery. Since IP is connectionless,
- it does not maintain any connection state information. Each IP datagram is
- sent out without regard to the last one or the next one. This, along with
- the fact that it is trivial to modify the IP stack to allow an arbitarily
- chosen IP address in the source (and destination) fields make IP easily
- subvertible)
- IPAC - IP Accounting (an IP accounting package for Linux. It collects,
- summarizes and nicely displays IP accounting data. The output of IPAC can be
- a simple ASCII table, an ASCII graph or even GIF images with graphs showing
- traffic progression. IPAC can be used for IP traffic analysis and for
- accounting purposes. Runs on top of the ipfwadm or ipchains tool)
- IPENCAP - IP Encapsulation in IP
- IPFM - IP Flow Meter (a bandwidth analysis tool that counts how the number
- of bytes each host on specified subnest each host on specified subnest
- transfers to internet gateways. It outputs a list of these hosts and their
- transfer amounts at specified delays. IPFM uses libpcap and aims to be
- portable. IPFM was programmed by Robert Cheramy & Andres Krapf)
- IPN - I'm posting naked (mainly used in IRC)
- IPO - Internet Philanthropic Organization
- IPP - Internet Printer Protocol
- IPPL - IP Protocol Logger (logs tons of incoming and outgoing traffic)
- IR - Instruction Register
- IRC - Internet Relay Chat
- IRL - In real life (that is, when not chatting) (mainly used in IRC)
- IRQ - Interrupt Request
- IRS / IRSN - Initial Receive Sequence Number (the IRSN is learned during the
- 3-Way TCP handshake. See ISN)
- ISDN - Integrated Services Digital Network (a type of phone line which
- faster than most regular phone lines. Supports multi-usage, which means you
- can use your modem and your phone on the same line simultaneously, each
- getting 6.4KPS)
- ISN - Initial Sequence Number (usually 1. See TCP)
- ISO - Organization for International Standards / International
- Standardization Organization
- ISO-TP4 / ISOTP4 - ISO Transport Protocol Class 4
- ISP - Internet Service Provider
- ISS - Internet Security Systems (an Atlanta-based security-auditing firm) /
- Internet Security Scanner (a network scanner that searches for possible
- security holes)
- ISS / ISSN - Initial Sent Sequence Number (another name for the ISN. That's
- how TCP calls it: tcp_iss)
- IT - Information Technology
- ITAA - Information Technology Association of America
- ITS - Intelligent Transportation System
- IUCC - Israel Inter-University Computation Center
- IYSWIM - If you see what I mean (mainly used in IRC)
- JBOD - Just a bunch of disks (like RAID, etc.) (mainly used in IRC)
- JCL - Job Control Language
- JDO - Jewish Defense Organization (http://www.jdo.org)
- JET - Job Entry Terminal
- JIC - Just in case (mainly used in IRC)
- JK / J/K - Just kidding (mainly used in IRC)
- JOOTT - Just One Of Those Things
- JP - John Vranesevich (the founder of antionline.com. Read about why he's a
- racist media whore and all sorts of bad things at www.attrition.org in the
- "High Slanders" section)
- JPEG - Joint Photo Experts Group
- JTF CND / JTF-CND / JTFCND - Joint Task Force for Computer Network Defense
- JTR / JtR - John the Ripper (a Unix password cracker)
- JV / JVIEW / JView - Java Viewer
- JVM - Java Virtual Machine (a program that let's you run Java applications
- from a non-java OS)
- K - OK / Thousand
- KB - Kilobyte
- KC - Kilo Cycle
- KDE - Kewl Desktop Environment (a Window Manager for X11 (XWindows))
- KFM - KDE File Manager
- KHG - Kosovo Hackers Group
- KIAM - Keldysh Institute of Applied Mathematics (The famous Russian
- Institute)
- KISS - Keep It Simple Stupid
- KLOG - Kernel Logger (see KLOGD)
- KLOGD - Kernel Logger Daemon (a program that comes with every Unix
- distribution AFAIK and logs Kernel-related events)
- KNU - KDE Network Utilities (a kde program that has several networking
- tools. It includes ping, traceroute, host resolution, finger and mtr)
- KOD - Kiss Of Death
- KOTM - Kook Of The Month
- KPS / KBSP - KBs per second (the amount of KBs that are transferred per
- second on the current connection speed)
- KSH - Korn Shell (a Unix shell. Usually located at /bin/ksh)
- KVT - KDE Virtual Terminal
- KWIM? - Know what I mean? (mainly used in IRC)
- L8LY - Lately (mainly used in IRC)
- L8R - Later (mainly used in IRC)
- LAD - Login Anomaly Detection
- LAN - Local Area Network
- LART - Looser Attitude Readjustment Tool (baseball bats are popular)
- LASG - Linux Administrators Security Guide (www.seifried.org/lasg)
- LBA - Logical Block Address
- LBL - Lawrence Berkeley Laboratory
- LBNL - Lawrence Berkeley National Laboratory
- LC - Logical Coordinates
- LCD - Liquid Crystal Display
- LD - Later, dude (mainly used in IRC) / Link Dead / Long Distance
- LDAP - Lightweight Directory Access Protocol
- LDP - Linux Documentation Project
- LDR - Long-distance relationship (mainly used in IRC)
- LE - Link Exchange (a banner-exchange network plus tons of cool services for
- webmasters. http://www.linkexchange.com)
- LED - Light Emitting Diode
- LEET / L33T - Elite (a language mainly used by hackers on IRC, when 3 is e,
- 4 is a, 8 is ate (for example: m8=mate, l8r=later), 1 is l, 5 is s, 7 is t
- and 0 is o. Hackers mainly use l33t on IRC just for "phun", but if you catch
- someone using l33t a bit 2much he's probably just another hacker-wannabe)
- LF - Line Feed (a system character used by DOS, UNIX and DOS/UNIX-based OSs
- (Winblows=DOS-based, Linux(any distribution)=UNIX-based). It is a special
- ASCII character called Line Feed that means "end of line" in text files.
- While in UNIX-based OSs the end of a line is marked only by an LF, DOS-based
- OSs use a CR (Carriage Return) character and then an LF)
- LFN - Long File Name
- LIDS - Linux Intrusion Detection System (a patch which enhances the kernel's
- security. Wehn it's in effect, many system administration operations can be
- made impossible even for root. You can turn the security protection on or
- off online and you can hide sensitive processes and prevent anyone from
- using ptrace on your system. LIDS can also provide raw device and I/O access
- protection. Changes: minor typos, license to kill for smoother automatic
- shutdown (UPS), update option for lids.conf dev/inode numbers and a 2-level
- encryption password. Homepage: www.soaring-bird.com.cn/oss_proj/lids)
- LILO - LInux LOader
- LIS10 - Listen (mainly used in IRC)
- LKM / LLKM - Loadable Linux Kernel Modules
- LL - Link Looker (a program that detects server splits on IRC)
- LLTA - Lots and lots of thunderous applause (mainly used in IRC)
- LMOS - Loop Maintenance Operations System
- LN - Link
- LNK - Link
- LOD / LoD - Legion Of Doom (a hacking group)
- LOGIN - Log In (whenever you telnet into a system it asks you to login and
- asks you for a login and a password. A login is like a username, but there
- is more than that. Logging means keeping track of everything that happens in
- a given place. When you log in, the system logs your every move, even if you
- type in a bad password and never get a command prompt at all. For more info,
- type man login on a UNIX system)
- LOL - Laughing Out Loud / Lots of Laughs / Lots Of Lag
- LOTR / LotR - Lord of the Rings
- LOU / LoU - Legions Of the Underground (a hacking group)
- LP - Line Printer
- LPH - Local Password Hacker (a program that hacks locally-saved passwords
- such as screen saver passwords, passwords for protected areas etc')
- LPI - Lines Per Inch (kinda like DPI, only it's a different scale)
- LRF - Little Rubber Feet (the little pads on the bottom of displays and
- other (mainly used in IRC)equipment)
- LS - List (a Unix command which lists the contents of a directory but can do
- a lot more than that. For more info type man ls)
- LSA - Local Security Authority (this is also known as the Security
- Subsystem. It is the central component of NT security. It handles local
- security policy and user authentication. LSA also handles generating and
- logging audit messages. Quoted from the Hack Faq)
- LSCP - LiteStep Control Panel
- LSL - Linux System Labs
- LSM - Linux Software Map (VERY useful. http://execpc.com/lsm)
- LTM - Laugh to myself (mainly used in IRC)
- LUG - Linux User Group
- LUN - Logical Unit Number
- lUSt / LUST - Linux Users Strike Today (a hacking group)
- LVD - Low Voltage Differential
- M0D - Masters Of Downloading (a hacking group. They cracked several .gov
- websites, including senate.gov)
- M8 - Mate (mainly used in IRC)
- M8Y / M8EY - Matey (mainly used in IRC)
- MAC - Media Access Control / Medium Access Control / Macintosh (a cool PC by
- Apple. The only problem with it is that it has about 100 times less programs
- than Windows has. Even though you can always run 'virtual machines'
- (emulators) on your Mac and therefore be able to run Windows from it, common
- belief is that Macs are dangerous since you could get stuck with a crapload
- of non-compatible software)
- MAME - Multiple Arcade Machine Emulator (an emulator)
- MAN - Metropolitan Area Network / Manual (a very useful Unix command. Type
- 'man command' (without the quotes) and you will get the "man pages" (a
- manual) for this command)
- MAPS - Mail Abuse Prevention System
- MB - MegaByte (1,024K) / Message Board
- MBM - MotherBoard Monitor
- MBR - Master Boot Record
- MCB - Multi Collide Bot
- MCGA - Multi Color Graphics Array (kinda like VGA)
- MCI - Media Control Interface
- MCP - Microsoft Certified Professional
- MD - Message Digest
- MDI - Multiple Document Interface
- MEM - Memory
- MEMS - Micro Electro Mechanical System (devices invented by Sandia National
- Laboratory. It's a tiny lock, so tiny that it can fit on a chip, and it's
- gears can only be seen by microscopes. It physically prevents access from
- devices and you only have one try to guess the code before the system shuts
- itself down. Sandia National Laboratory claims they can build a hacker-proof
- computer with this little baby. More info at www.mdl.sandia.gov/microma)
- MESH - Macintosh Enhanced SCSI Hardware
- MESS - Multi Emulator Super System
- MFC - Microsoft Foundation Class (a bunch of basic files for Visual
- Basic/Visual C++ applications)
- MFI / MOI - Missing From/On IRC (mainly used in IRC)
- MGA - Masquerading Gateway Administrator (it's a little script for UNIX for
- managing your masquerading gateway so you don't have to fiddle with
- ipchains/ifconfig/redir all the time. You can manage port redirections, ip
- alliases and entires in the ipchains forward chain)
- MHOA - Microsoft Haters Of America (http://members.tripod.com/MHOA)
- MICRO - Microsoft
- MICROSOFT - Most Intelligent Costumers Realize Our Software Only Fools
- Teenagers ;)
- MID/MIDI - Musical Instrument Digital Interface (a .mid file contains
- instructions for the sound device to create notes. The music is divided into
- tracks where each track can have the soun of a different musical instrument,
- and all of the channels are played together. This way you can make channel
- one play the bass line as a bass guitar, channel two to be an organ, channel
- three to be an electric guitar, thus making your own music note by note,
- command by command. General MIDI files contain up to 10 tracks, extended
- MIDI files up to 16 tracks. Channel 10 is the standard for the beat (drums)
- channel. The result depends on your sound device. Sound Blaster 16, for
- example, would produce sounds similar to a PC BEEP (lol) for all
- instruments, while SOund Blaster AWE64 uses sound samples and the music it
- produces sounds very realistic. There are also applications that come with
- their own sound samples. MIDI files can also contain lyrics for programs
- that can show them, so you could host your own kareoke party!)
- MIL - Military (a URL extension. For example: www.usarmy.mil)
- MIME - Multipurpose Internet Mail Extensions (a protocol that is used to
- view Email)
- Min - minute
- MINUET - Minnesota Internet Users Essential Tool
- MIPS - Meaningless Indication of Processor Speed ;)
- MIT - Massachusetts Institue of Technology
- MKS - Mortice Kern Systems
- ML - Mailing List
- MLIST - Mailing List
- MLS - Multilevel Security
- MLT - Mechanized Loop Testing
- MMX - MultiMedia eXtensions
- MNS - Multifunctional Network Scanner
- MOD - Magneto Optical Disk / Moderator / Masters Of Downloading (a hacking
- group. They cracked several .gov websites, including senate.gov)
- MoD - The British Ministry of Defence
- MODEM - MOdulator/DEModulator (modulating - the act of turning bits into
- analogic signals which can be transferred through phone systems.
- Demodulating: the opposite of modulating)
- MON - Monitor
- MoRE / MORE - Masters of Reverse Engineering
- MorF - Male or female (mainly used in IRC)
- MOSS - Member of the same sex (mainly used in IRC)
- MOTD - Message Of The Day (mainly used in IRC)
- MOTM - Message Of The Month (mainly used in IRC)
- MOTOS - Member Of The Opposite Sex (mainly used in IRC)
- MOV - Movie / a great computer video format by Apple
- MP3 - MPEG 3-Layer (the best music format that has both quality and a small
- size (1 minute = ~1MB in CD quality). You can download many MP3s from all
- sorts of places on the net, but instead of searching for the keyword MP3 or
- your favorite song/artist and finding trillions of sites with dead links or
- tons of commercials just go to http://move.to/mp3center. The layout is okay
- but I find it rather reliable and easy-to-navigate. I often find tons of
- rare MP3s there that don't seem to show up in other websites)
- MPEG - Motion Picture Experts Group (a superb computer video format)
- MPSRT - Microsoft Product Security Response Team
- MRTG - Multi Router Traffic Grapher
- MS - Microsoft (or more to say, Micro$oft)
- MSDN - Microsoft Developer's Network
- MSDOS / MS-DOS / MS DOS - Microsoft Disk Operating System (Microsoft's
- version of the DOS OS)
- MSG - Message
- MSIE - Micro$oft Internet Explorer (often called ExPlonter, Exploiter etc')
- MSN - Microsoft Network (enough said... http://www.msn.com)
- MSP - Micro$oft Paint
- MSS - Maximum Segment Size (the value of your MTU minus 40)
- MTD - Memory technology Driver
- MTRR - Memory Type Range Register
- MTU - Maximum Transfer Unit (max size of packets)
- MUD - Multi User Dimension (kinda like a D&D/AD&D game on the internet)
- MUL - Multiply
- MV - Move
- MVFC - "ma va a fare in culo" (Italian for "go fuck yourself off")
- MX - Mail eXchanger
- N - And
- N E 1 / NE1 - Anyone (mainly used in IRC)
- NA - Network Associates
- NA or N/A - Not Available
- NAI - Network Associates
- NAK - Negative Acknowledgment (ASCII char number 21 that is transmitted to
- the sending unit by the receiving unit and means that the wrong signal has
- been sent)
- NAP - Network Access Point
- NASSCOM - National Association of Software and Service Companies
- NAT - Network Address Translation
- NB - Netbus (one of the most famous Windows remote administration trojans,
- made by CF. Once you run the server file, anyone with the client program or
- a simple telnet application can access your computer. Basically it opens a
- backdoor on your computer. The default port for the backdoor is 12345 but it
- can be changed for numerous reasons. The backdoor can be locked with a
- password so only the person who sent you the server file in the first place
- can access the backdoor. OK, unless the password gets mysteriously hacked...
- both the server and the client are to be executed on Windows only)
- NBP - Name Binding Protocol
- NC - Network Computer
- NC - Norton Commander
- NCIC - National Crime Information Center
- NCP - Network Control Protocol
- NCSA - National Center for Supercomputing Applications
- NCSC - National Computer Security Center
- NDIS - Network Driver Interface Specification
- NDS - Novell Directory Services
- NET - Network
- NetBEUI - NetBIOS Extended User Interface
- NetBIOS - Network Basic Input/Output System
- NETHOOD - "Network Neighborhood"
- NEXT - Near-End Crosstalk
- NFC - No Further Comment / No Fucking Comment
- NFO - iNFO
- NFR - Network Flight Recorder (kinda like a network activity logger)
- NFS - Network File System (a system that is used for files over a network...
- LOL)
- NFW - No feasible way / no fucking way (mainly used in IRC)
- NFW - No Fuckin' Way (mainly used in IRC)
- NGREP - Network GREP (a pcap-aware tool that will allow you to specify
- extended regular expressions to match against the data payloads of packets,
- and currently recognizes TCP and UDP, and works on Ethernet, PPP and SLIP
- interfaces. Excellent tool)
- NI2 - Net Indexer 2
- NIC - Network Interface Card / Network Information Center
- NIDS - Network Intrusion Detection System
- NIPR - Non-classified Internet Protocol Router
- NIPS - National Infrastructure Protection Center (kinda like CERT only
- they're still online and they aren't being so late with their advisories)
- NIS - Network Information System
- NIST - National Institute of Standards and Technology
- NIT - Network Interface Tap
- NM / N/M - Never Mind (mainly used in IRC)
- NMAP - Network Mapper (see www.insecure.org/nmap)
- NMAPFE - NMAP Front End (see www.insecure.org/nmap)
- NME - Enemy (mainly used in multiplayer games)
- NMO - New Millenium Organization (a lame "hacking" group. Netbus...
- www.nmorg.com)
- NMRC - Nomad Mobile Research Center (a security group. www.nmrc.org)
- NNTP - Network News Transfer Protocol
- NOC - Network Operations Center / No See (as in "Sup m8! Long tyme noC.")
- noC / NoC - See NOC
- NOP - No Operation
- NOS - Network Operating System
- NP / N/P - No Problem
- NPA - Numbering Plan Area
- NPL - National Physical Laboratory
- NPS - Nevermind (mainly used in IRC)
- NREN - National Research and Educational Network
- NRG - Network Research Group
- NRN - No Response/Reply Necessary (mainly used in IRC)
- NS - Netscape / Name Server / Network Solutions (the only company which
- provides top-level domain names. Other companies simply go there and do the
- dirty job for you. http://www.networksolutions.com
- NSA - Name Service Architecture
- NSF - National Science Foundation
- NSI - Network Solutions (see NS)
- NSS - Novell Storage Services / Network Security Scanner (a network scanner
- that searches for possible security holes.
- http://www.giga.or.at/pub/hacker/unix)
- NSW - Network Security Wizards (http://www.network-defense.com)
- NT - Network / Windows NT (Windows for networks)
- NTA - The Nocturnal Trading Alliance (a hacking group)
- NTDS - Naval Tactical Data System
- NTFS - NT File System (NT=Windows NT)
- NUMA - Non-Uniform Memory Access
- NURMS - Non Uniformally Rational Mesh Smooth
- NVLAP - National Voluntary Laboratory Accrediation Program
- NVRAM - Nonvolatile RAM
- NWG - Network Working Group
- O/S - Operating System
- OCC - Occupied
- OCR - Optical Character Recognition
- OCX - OLE Custom Control
- ODBC - Open Database Connectivity
- ODI - Open Data-Link Interface
- ODL - Object Description/Definition/Design Language
- ODL - Open and Distance Learning
- ODMA - Open Document Management API
- OEM - Original Equipment Manufacturer
- OF / O/F - Offline
- OFCS - Oh, For Christ's Sake (mainly used in IRC)
- OHB - Organization Hacker Brasilia (Brazilian Hacker Organization.
- http://www.ohbrasil.cjb.net)
- OHG - Oh, Gotcha! (mainly used in IRC)
- OHWELL - Oh Well (see OWELL)
- OIC - Oh, I see (mainly used in IRC)
- OL / O/L - Online
- OLAP - Online Analytical Processing
- OLC - OnLine Creation
- OLE - Object Linking and Embedding
- OLL - Online love (mainly used in IRC)
- OLTP - Online Transaction Processing
- OMG - Object Management Group / Oh My God (mainly used in IRC)
- OO - Object-Oriented
- OOB - Out Of Band
- OOC - Out of Character (used mainly in MUDs)
- OOP - Object Oriented Programming (too complicated to explain here. Go read
- a book)
- OPAC - Online Public Access Catalog
- OpenGL - Open Graphics Library
- OPENSEC / OpenSEC - Open Security Solutions (a mailing list dedicated to
- announcing the latest versions of free and Open Source security tools. For
- more information, go to opensec.net)
- ORB - Object Request Broker
- ORBS - Open Relay B System ("The short answer: ORBS is a database of open
- mail relays, accessible via DNS lookup." Not the whole truth, but a good
- first approximation. www.orbs.org)
- OS - Open Source / Operating System
- OS/2 - Obsolete Soon, Too ;)
- OSF - Open Software Foundation
- OSG - Open Service Gateway Initiative
- OSH - Operatr SHell
- OSI - Open Systems Interconnection
- OSP - Online Service Provider
- OSPF - Open Shortest Path First
- OTB - Only The Best (a chat acronym / an extremely lame hacking-related
- website. They claim their site is not meant for people who want to harm
- other people. Oh, yeah? Then why do you feature lame nukes and icq programs?
- "For educational purposes"? Yeah, right... otb.tsx.org.)
- OTF - Off The Floor (mainly used in IRC)
- OTOH - On The Other Hand (mainly used in IRC)
- OTP - One-Time Pass (a program that provides unrestricted one-time pass
- codes on a user by user basis without any need for cryptographic protocols
- or hardware devices. The user takes a list of usable pass codes and
- scratches out each one as it is used. The system tracks usage, removing each
- passcode from the available list when it is used. Comes with a very small
- and fast password tester and password and pass phrase generation systems.
- Excellent against network sniffers and keyloggers)
- OTTOMH - Off the top of my head (mainly used in IRC)
- OWELL - Oh Well (mainly used in IRC)
- OWN / 0WN - "owned" or "hacked" (mainly used in IRC)
- OWNED / 0WNED - "owned" or "hacked" (see 0WN)
- PANS - Pretty awesome new stuff (as opposed to "POTS") (mainly used in IRC)
- PANW - Parents Are Not Watching
- PAP - Password Authentication Protocol
- PARC - Palo-Alto Research Centre (a Computer research park owned by Xerox.
- This is where object-oriented programming, GUI and many other kewl stuff
- were first invented)
- PASSWD - Password
- PAW - Parents Are Watching (mainly used in IRC)
- PBF - Policy-Based Filtering
- PBM - Portable Bitmap / Play By Mail (an old type of networked multiplayer
- games. You send a series of commands over an Email network and you wait for
- a reply mail. Boring...)
- PBX - Private Branch eXchange
- PC - Personal Computer
- PCDOS / PC-DOS / PC DOS (IBM's identical version for MS-DOS)
- PCI - Peripheral Component Interconnect
- PCKT - Packet
- PCKTS - Packets
- PCMCIA - People Can't Master Computer Industry Acronyms (mainly used in IRC)
- / Personal Computer Memory Card International Association (know these slots
- behind your computer? Well laptops have the same slots only they're a bit
- different and they're called PCMCIA slots)
- PDA - Public Display of Affection (mainly used in IRC) / Personal Digital
- Assistant (your little compy friend who will help you organize your messy
- schedule, phone numbers, cooking receipts etc')
- PDC - Primary Domain Controller
- PDL - Page Description Language
- PDX - Paradox (a hacking group)
- PE - Public Enemy (a hacking group) / Pirated Education (a hacking group)
- PEBCAK - Problem exists between chair and keyboard (mainly used in IRC)
- PECSENC - The President's Export Council Subcommittee on Encryption
- PEGS - PErl Graphical Structures
- PENTIUM - Produces Erroneous Numbers Through Incorrect Understanding of
- Mathematics ;)
- PERL - Protocal Extraction and Report Language / Practical Extraction and
- Report Language (an interpreted programming language)
- PERM - Permission
- PGF - Portable Graphics format
- PGM - Portable Greymap
- PGP - Pretty Good Privacy (an encryption method)
- PHACV / P/H/A/C/V - Phreaking, Hacking, Anarchy, Cracking, Virii (see HPVCA)
- PHF - Phreaking Hacking Force (www.p-h-f.org)
- PHG - Pakistan Hacking Group
- PIBKAC - Problem is between keyboard and chair (mainly used in IRC)
- PICS - Parental Internet Content SelectionR
- PID - Process ID (every process (running program) on Unix has a PID. To view
- running processes and their PIDs type ps. If you know the PID of a process
- you can also kill it (stop the process immedietly) by typing kill PID and
- replacing PID with the process ID)
- PIF - Program Information File
- PIKT - Problem Informat / Killer Tool (PIKT is a multifunctional tool for
- administering networked workstations. It features an embedded scripting
- language and a powerful script processor for generating the reports you need
- over the network. PIKT's primary purpose is to monitor systems, report
- problems, and fix those problems when possible.
- http://pikt.uchicago.edu/pikt/)
- PIN - Personal Identification Number
- PINE - Pine Is No longer Elm (Pine is today's Email client of choice on
- text-based UNIX shells (remote or local). Pine is also an acronym, which
- stands for Pine Is No longer Elm. Elm was an older UNIX Email client which
- was later replaced with Pine. Both Pine and Elm were in use since the old
- days of ARPANet, the US Defense Advanced Research Projectgs Agency computer
- network that eventually mutated into today's Internet once it became open
- for the masses in the early 90s)
- PING - Packet INternet Groper (everything sent to the ping port will be
- echoed back. This is good for finding out of the target host is alive
- (conencted). The actual verb (to ping) means to send something to the echo
- port)
- PIO / PI/O / P I/O - Programmed I/O
- PIP - Picture Inside Picture
- PITA - Pain in the ass (mainly used in IRC)
- PL - Perl
- PL/1 / PL1 - Program Language #1
- PLIP - Parallel Line Internet Protocol
- PLZ - Please (mainly used in IRC)
- PMFJIB - Pardon me for jumping in but... (mainly used in IRC)
- PMT - Progenic Mail Trojan (a program by Progenic Warfare (www.progenic.com)
- that is actually a trojan that, once run, finds all the passwords on your
- computer and then mails them to the guy who sent the trojan to you)
- PMTU - Path Maximum Transfer Unit
- PNG - Portable Network Graphic
- PNP - Plug aNd Play (this neat little feature that autodetects new hardware
- and hardly works. Well, at least on Windows...)
- POC / PoC - Proof Of Concept (a security group. http://poc.csoft.net)
- POD - Portal Of Doom (Hackcity's lame Windows remote administration trojan.
- Once you run the server file, anyone with the client program or a simple
- telnet application can have full control over your computer. The server file
- can be hidden inside programs or games. Basically it opens a backdoor on
- your computer. The backdoor can be locked with a password so only the person
- who sent you the server file in the first place can access the backdoor.
- Well, unless the password gets hacked, of course. Both the server and the
- client are to be executed from Windows 95/98. www.hackcity.com)
- POP - Post Office Protocol (If you've got a mail account on your ISP it's
- probably a POP3 account) / Pentagram Of Protectors (a power-up in the famous
- first person shooter game Quake. Gives you protection for some time)
- POSIX - Portable Operating System Interface based on uniX (a collections of
- standards for UNIX OSs)
- POST - Power On Self Test
- POT - Plain Old Telephone / Ping Observation Tool (a highspeed tool to sweep
- for smurf broadcast amplifiers, it compiles a broadcast amplifier list of
- the complete IPv4 address range in about 5 days (with enough bandwidth).
- (this was a review from Packet Storm Security (packetstorm.securify.com))
- POTS - Plain old telephone service (mainly used in IRC)
- PPL - People (mainly used in IRC)
- PPM - Portable PixelMap
- PPP - Point to Point Protocol (when you connect to your ISP you get a PPP
- connection that allows you to view pretty pictures and animations and sounds
- during your internet stay. Other protocols such as the telnet protocol only
- transfer text)
- PPS - Packets Per Second
- PPTP - Point-to-Point Tunneling Protocol
- PREFS - Preferences
- PRNG - Pseudo Random Number Generator
- PROC - Process
- PROG - Program
- PROGMAN - Program Manager (the interface used by Windows 3.11. You can still
- use it from Windows 95 and 98 by simply typing program at the run dialog box
- or going to Windows' directory and executing progman.exe)
- PROLLY - Probably (mainly used in chatrooms)
- PS - Post Script / Packet Storm (an excellent securtiy-related website.
- http://packetstorm.genocide2600.com)
- PSH - Push (a TCP flag. More info at the entry TCP)
- PSN - Packet Switching Network
- PSS - Packet Storm Security (an excellent security-related website.
- http://packetstorm.genocide2600.com)
- PSTN - Public Switched Telephone Network
- PSY - Psychose (a hacking group)
- PU - That stinks! (mainly used in IRC)
- PUTER - Computer
- PUP - PARC Universal Packet Protocol
- PWD - Print Working Directory (a Unix command. Prints the name of the
- current directory (the directory you're in now) and it's full path to the
- screen. For example: if you type pwd and it returns /usr/root it means
- you're in /usr/root. Hey! You'd better not be really getting root! Stay away
- from my box, you pervert! lol. For more info type man pwd)
- PWL - Password List
- PWS - Personal Web Server (a lame Windows webserver by Microsoft)
- QBasic - Quick Basic (if BASIC is your language than QBASIC is your
- interpeter. Well, at least one of the interpeters available)
- QHA - Quebec Hackers' Alliance (a hacking group. www.qha.net)
- QTX - Quartex (a hacking group)
- R - Read / Repeat / Recursive / Remote
- RAID - Redundant Array of Inexpensive Disks (a system that includes many HDs
- or other forms of data storage)
- RAM - Random Access Memory
- RAS - Remote Access Server
- RASMAN - Remote Access Connection Manager
- RAT - Remote Access Trojan (a program that when run opens a port on your
- computer and acts as a daemon. Everyone running the appropriate client (or
- everyone who knows raw commands for this specific RAT) can get some sort of
- access to your computer, depending on how sophisticated the RAT is)
- RAW - Remote Administration Window (yet another lame Windows remote
- administration trojan. Once you run the server file it opens a backdoor on
- your computer and anyone with the client program or a simple telnet
- application can access your computer. The backdoor can be locked with a
- password so only the person who sent you the server file in the first place
- can access the backdoor. OK, unless the password gets mysteriously hacked...
- both the server and the client are to be executed from Windows 95/98)
- RBL - Realtime Blackhole List
- RBOC - Regional Bell Operating Company
- RC - Reconfigure
- RCMD - Remote Command (a trust-relationshisp-based Unix remote file copying
- program. For more information, tyep man rcp)
- RCP - Remote Copy (a trust-relationships-based Unix remote file copying
- program. For more information, type man rcp)
- RCS - Revision Control System
- RCW - Receive Window
- RDM - Relational Data Model
- RDRAM - Rambus DRAM
- RDP - "Reliable Datagram" Protocol
- RECV - Receive
- REG - Registry
- REGEXP - Regular Expression (a powerful type of wildcard pattern. Used for
- pattern matching in programs such as the Unix program grep)
- REM - Remember
- RES - Resolution
- REXD - Remote Execution Daemon
- RFC - Remote Function Call / Request For Comment (papers by the IETF that
- contain suggestions for Internet standards. RFCs are great places to learn
- from. I usually look up RFCs at howto.linuxberg.com)
- RFC - Request For Comment (used mainly in usenet newsgroups)
- RFTRFC - Read the fine/fucking RFC (mainly used in IRC)
- RGB - Red Green Blue
- RH - RedHat (a UNIX variant. www.redhat.org)
- RIA - Rebels of the Information Age (http://ria.tict.net)
- RIP - Routing Information Protocol
- RISC - Reduced Instruction Set Computer (As in RISC OS, the OS run by
- Acorns)
- RK - Root Kit
- RL - Real life (that is, when not chatting) (mainly used in IRC)
- RLOGIN - Remote Login (a trusted-relationships-based remote Unix remote
- login program. For more information, type man rlogin)
- RM - Relational Model / Research Machine (Don't buy one, whatever you do.
- Get a Dell, even a Tiny (but shudder at the thought of a Tiny), but NOT an
- RM. Read the RM Networks tutorial by Njan in the tutorials page at
- blacksun.box.sk) / Remove (RM can be either used as an abbreviation for
- remove but is also the Unix command that deletes files. For more info look
- up the entry MAN in this file and use it)
- RN / REN - Rename
- ROF - Rate Of Fire
- ROFL / ROTFL - Rolling On (The) Floor Laughing
- ROFLMAO / ROTFLMAO - Rolling On (The) Floor Laughing My Ass Out
- ROFLMAOWPIMP - ROFLMAO While Peeing In My Pants (mainly used in IRC)
- ROFLMBO / ROTFMBO - Rolling On (The) Floor Laughing My Butt Out (mainly used
- in IRC)
- ROFLMBOWPIMP / ROTFMBWPIMP - ROFLMBO While Peeing In My Pants (mainly used
- in IRC)
- ROFLWPIMP / ROFTLWPIMP - ROFL While Peeing In My Pants (mainly used in IRC)
- ROM - Read Only Memory
- ROR - Raffing out roud (English for "laughing out loud") (mainly used in
- IRC)
- ROT - Rate Of Turn
- ROTFL - Rolling on the floor laughing (mainly used in IRC)
- ROTFLMAO - Rolling on the floor laughing my ass off (mainly used in IRC)
- ROTFLMAOWPIMP - Rolling On (The) Floor Laughing My Ass Out While Peeing In
- My Pants (mainly used in IRC)
- RP - Responsible Person (the person who is responsible for a specific
- domain)
- RPC - Remote Procedure Call
- RPG - Role-playing Game
- RPH / RPHH - Royal Phreakers HouseHold (a lame hacking/phreaking/virii
- group. Just another bunch of script kiddies. Oh yeah, and they have a
- newsletter which seems to have a tendancy to come out 6 months late.
- www.rphh.org)
- RPM - Redhat Package Manager (a command used in RedHat Linux to install
- programs that come as .rpm files)
- RR - Resource Record
- RRS - Remote Registry Sharing
- RSB - Repair Service Bureau
- RSH - Restricted bourne SHell / Remote Shell (a trusted-relationships-based
- Unix remote shell program. For more information, type man rsh)
- RSN - Real Soon Now (mainly used in IRC)
- RST - Reset (see ACK) / Reliable Software Technologies
- RSPF - Radio Shortest Path First
- RT - Route
- RTC - Remote Target Control / Real Time Clock
- RTF - Rich Text Format
- RTFF - Read the fine/f***ing f***
- RTFM - Read the fine/fucking manual (mainly used in IRC)
- RTMP - Routing Table Maintance Protocol
- RTS - Real-Time Strategy
- RTT - Round Trip Time (the time it takes to receive some sort of a reply
- from the receipt, or in other words the time it takes for you to send a
- packet to someone and to that someone to send a packet back to you)
- RWIN - Receive Window
- RYO - Roll your own (write your own program; derived from cigarettes rolled
- yourself with tobacco and paper) (mainly used in IRC)
- RZR - Razor (1911) (a hacking group)
- S!P / SIP - Surpr!se Productions (a hacking group)
- S/MIME - Secure / MIME (an encryption standard)
- SA - System Administrator
- SAA - System Application Architecture
- SAFTE - SCSI Accessed Fault-Tolerant Enclose
- SAGE - Systems Advisory Group Enterprises
- SAINT - Security Administrator's Integrated Network Tool (gathers
- information about remote systems and examines possible security flaws. The
- collected data can then be analyzed using a simple rules-based system (or
- via other included interfaces))
- SAM - SCSI-3 Architecture Model / Security Account Manager (a component in
- NT's security. SAM handles user and group accounts, and provides user
- authentication for LSA. Quoted from the Hack Faq)
- SARA - the Security Auditor's Research Assistant ((as described by Packet
- Storm Security) a third generation security analysis tool that is based on
- the SATAN model, conforms to the Open Source model, is covered by the GNU
- open license, fosters a collaborative environment, and is updated on a
- weekly basis. Advanced Research's philosophy relies heavily on software
- re-use. Rather than inventing a new module, SARA is adapted to interface to
- other community products. For instance, SARA interfaces with the popular
- NMAP package for superior "Operating System fingerprinting". Also, SARA
- provides a transparent interface to SAMBA for SMB security analysis. SARA's
- features include: Built-in report writer (by subnet or by database),
- Built-in summary table generator, Gateway to external programs (e.g., NMAP),
- CGI-BIN vulnerability testing (Unix and IIS), SSH buffer overflow
- vulnerabilities, Current Sendmail vulnerabilities, IMAPD/POPD buffer
- overflow vulnerabilities, Current FTP and WU-FTP vulnerabilities, Tooltalk
- buffer overflow vulnerbilities, Netbus, Netbus-2, and Back Orifice
- vulnerabilities, Improved Operating System fingerprinting, Firewall-aware,
- Weekly updates, Probing for non-password accounts, NFS file systems exported
- to arbitrary hosts, NFS file systems exported to unprivileged programs, NFS
- file systems exported via the portmapper, NIS password file access from
- arbitrary hosts, REXD access from arbitrary hosts, X server access control
- disabled, Arbitrary files accessible via TFTP, Remote shell access from
- arbitrary hosts, Writable anonymous FTP home directory.
- SARA - Security Advisor's Research Assistant (http://www-arc.com/sara)
- SATAN - Security Analysis Tool for Auditing Networks (or Security
- Administrator's Tool for Analyzing Networks. SATAN is a remote network
- scanner, and is considered one of the best. In fact, it was the first truly
- user-friendly network scanner. It features an HTML interface, complete with
- forms to enter targets, tables to display results and context-sensitive
- tutorials that appear when a hole has been found. A must have for hackers
- and sysadmins alike)
- SBC - SCSI Block Commands
- SBP - SCSI-3 serial Bus Protocol
- SCAM - SCSI Configured AutoMatically
- SCC - SCSI Controller Commands
- SCCS - Source Code Control System
- SCIG - Secure Central internet Gateway (this gateway enables government
- bureaus and departments to securely access the Internet. It includes
- firewalls, virus detection systems and proactive intrusion detection
- systems)
- SCR - Screen Saver
- SCSA - Sun Common SCSI Architecture
- SCSI - Small Computer System Interface
- SD - ShowDown (an IRC script) / Single Density (a floppy disk type)
- SDI - Single Document Interface
- SDMI - Secure Digital Music Initiative (another attempts to eradicate
- illegal CD-duplication. SDMIs will be incorporated into CDs and will make it
- possible to trace pirated material and it's creator)
- SDMS - SCSI Device Management System
- SDSL - Single-line Digital Subscriber Line
- SDWB - Sega Dreamcast Web Browser (the web browser that comes with Sega
- Dreamcast)
- SEC - second
- SED - Stream Editor
- SEG - S***-eating grin (mainly used in IRC)
- SEQNUM - Sequence Number
- SET - Saqueadores Edicion Tecnica (a Spanish computer security e-zine)
- SF - Stellar Frontier (a realtime multiplayer space shooter that can be
- played over the Internet or a local intranet. See http://www.stardock.com
- for more information)
- SFS - Secure File System
- SGC - SCSI Graphic Commands
- SGI - Silicon Graphics Incorporated / Silicon Graphics Interface
- SH - Shell
- SIG - Special Interest Group
- SIIA - Software and Information Industries Association
- SIMD - Single Instructions Multiple Data
- SIMM - Single Inline Memory Module
- SIN - Self Induced Negotiativity (a security group. http://www.sinnerz.com)
- SIP - SCSI-3 Interlocked Protocol
- SIP - Surf In Peace
- SISAL - Streams and Iteration in a Single Assignment Language
- SITD - Still In The Dark
- SIQ - System Input Queue
- SIU - Stupid Internet User
- SLIP - Serial Line Interface Protocol
- SLL - Screw Looser Layer (this website is... uh... different...
- welcome.to/screwlooserlayer)
- SM - Sado Maso (not computer-related, you say? Ever heard of cybersex IRC?!)
- SMB - Server Message Blocks / Shared Message Blocks
- SMC - SCSI-3 Medium changer Commands
- SMDS - Switched Multimegabit Data Service
- SMP - Symmetrical Multiprocessing
- SMPS - Server Merchant Payment System
- SMTP - Simple mail Transfer/Transport Protocol
- SNAFU - Situation normal, all f***ed up (mainly used in IRC)
- SNES - Super Nintendo Emulation System
- SNK - Secure Net Key (a card that contains an encrypted password. Excellent
- against network sniffers and keyloggers, which will now be unable to catch
- the account information)
- SNS - Secure Network Server (www.nsa.gov/programs/missi/scc_sns.html)
- SO - Significant other (mainly used in IRC) / Source
- SOI / SoI - Subversion of Information
- SOL - Smilling out loud or sh*t out of luck (mainly used in IRC) /
- Scandinavia OnLine
- SOME1 - Someone (mainly used in IRC)
- SOMY - Sick of me yet? (mainly used in IRC)
- SOP - Super OP (if you're a SOP in a channel it means you get special OP
- rights which lower OPs don't get. A SOP it one level above an AOP and one
- below a founder)
- SOQ - System Output Queue
- SPC - SCSI-3 Primary Commands
- SPI - SCSI-3 Parallel Interface
- SQL - Structure Query Language
- SRC - Source
- SRI - Standards Research Institute
- SRM - Security Reference Monitor (a component of NT's security. SRM enforces
- access validation and auditing for LSA. It cheks user accounts as the user
- tries to access various files, directories, etc', and either allows or
- denies access. Auditing messages are generated as a result. The SRM contains
- a copy of the access validation code to ensure that resources are protected
- uniformly throughout the system, regardless of resource type)
- SRS - Secure Remote Streaming
- SS - Special Service / SubSeven (a remote administration tool)
- SSC - SCSI Stream Commands
- SSH - Secure Shell (SSH is a program to log into another computer over a
- network, to execute commands in a remote machine and to move files from one
- machine to another. It provides strong authentication and secure
- communications over insecure channels. It is intended as a replacement for
- rlogin, rsh, rcp and rdist)
- SSI - Server Side Include
- SSL - Secure Sockets Layer (a data transfer method. Used mainly to transfer
- credit card numbers and other valuable pieces of information)
- STARCON - Star Control (a famous, great for it's time and nostalgic space
- shooter and adventure game. There were three games in the series - Starcon
- 1, 2 and 3)
- STD - Standard
- STDOUT - Standard Output (whatever a command returns after it is executed.
- Errors, numbers, bits of information, whatever. For example: ping
- 123.45.67.89 may return "ping: 123.45.67.89 host unreachable" or "ping:
- 123.45.67.89 - 302ms" etc' etc', all depending on the command, the OS or
- other software, whether it succeeds and many other boring factors)
- STFW - Search the f*****g Web (mainly used in IRC)
- STOA - Scientific and Technical Options Assessment
- STROBE - The Super Optimized TCP Port Surveyor (a network scanner. More like
- a port scanner, only that it identifies what services are being run on the
- specified remote host. Very fast.
- http://sunsite.kth.se/Linux/system/Network/admin. Note: when running on
- Solaris 2.3 you have to run it with the -g flag for it to disable
- getpeername() in order to prevent a core dump)
- STW - Search the Web (mainly used in IRC)
- SU - Super User (type su and then it'll ask you for superuser's (root)
- password. Type it in, and walla! You're root)
- SUID - Set User ID
- SUNEXP - Sun Expire (The Solaris (the default OS on Sun's computers) useradd
- binary shipped with Solaris 7.0 has a bug which can possibly allow users who
- are supposed to be expired by a certain time to login. The problem with
- useradd is the interpretation of the value passed after the parameter -e
- (expire). If one were to use useradd to set an expiry date the following
- way: "-e 6/30/2000" the interpretation would be June 30, 2020. The result of
- this vulnerability is having expired users having access to the vulnerable
- host. This bug is nicknamed SunExp)
- SVC - Switched Virtual Circuit
- SVGA - Super VGA (an enhanced VGA monitor. Supports about 16.7 Million
- colors)
- SVID - "System V" Interface Definitor
- SWAG - Stupid wild-a** guess (mainly used in IRC)
- SYMLINK - Symbolic Link (the Unix equivelant to Windows' shortcuts, only
- they're much more powerful and customizable. For more info, type "man
- symlink" in a Unix prompt, without the quotes, of course)
- SYN - (See ACK)
- SYNC - Synchronize
- SYS - System
- SYSAD - System Administrator
- SYSADMIN - System Administrator
- SYSLOG - System Logger (see SYSLOGD)
- SYSLOGD - System Logger Daemon (a program that comes with every Unix
- distribution AFAIK and logs stuff)
- TAB - Table
- TAFN - That's all for now (mainly used in IRC)
- TANSTAAFL - There Ain't No Such Thing As A Free Lunch (mainly used in IRC)
- TAPI - Telephone Application Program Interface
- TAS - Telephone Answering Service
- TASS - Template ASSembly language (Intermediate language produced by the
- Manchester SISAL compiler)
- TB - TaraByte (1,000 GBs)
- TBA - To Be Arranged / To Be Announced
- TBF - Mean Time Between Failures
- TBG - Trojan B Gone (a local trojan scanner by Dark Eclipse software. See
- http://www.dark-e.com)
- TBIL - Tiny Basic Interpreter Language
- TBK - Tool Builder Kit
- TBL - A language by M.E. Lesk for formatting tables
- TBS - Turn-Based Strategy
- TCAUCE - The Coalition Against Unsolicited Commercial Email
- TCB - Trusted Computing Base
- TCP - Transfer Control Protocol (TCP is the connection-oriented, reliable
- transport protocol in the TCP/IP suite. Connection-oriented simply means
- that the two hosts participating in a discussion must first establish a
- connection before data may change hands. Reliability is provided in a
- number of means, but the two most important ones are data sequencing and
- acknowledgement. For acknowledgement, see the entry ACK. Now where were we?
- Oh, yeah, data sequencing. Since TCP is reliable, it must be able to recover
- from lost, duplicated, or out-of-order data. By assigning a sequence number
- to every byte transferred, and requiring an acknowledgement from the other
- end upon receipt, TCP can guarantee reliable delivery. The receiving end
- uses the sequence numbers to ensure proper ordering of the data and to
- eliminate duplicate data bytes. TCP sequence numbers can simply be thought
- of as 32-bit counters. They range from 0 to 4,294,967,295. Every byte of
- data exchanged across a TCP connection (along with certain flags) is
- sequenced. Now, how are sequence numbers set, you ask? Well, once a
- connection is starting to form (the first packet with the SYN flag on is
- sent), the sender of the SYN packet will set it's sequence number as an ISN
- - Initial Sequence Number. The next packet that will be sent will have the
- sequence number of ISN+1, etc'. The sequence number field in the TCP header
- will contain the sequence number of the *first* byte of data in the TCP
- segment. The acknowledgement number field in the TCP header holds the value
- of next *expected* sequence number, and also acknowledges *all* data up
- through this ACK number minus one. TCP uses the concept of window
- advertisement for flow control. It uses a sliding window to tell the other
- end how much data it can buffer. Since the window size is 16-bits a
- receiving TCP can advertise up to a maximum of 65535 bytes. Window
- advertisement can be thought of an advertisement from one TCP to the other
- of how high acceptable sequence numbers can be. Other TCP header flags of
- note are RST (reset), PSH (push) and FIN (finish). If an RST is received,
- the connection is immediately torn down. RSTs are normally sent when one end
- receives a segment that just doesn't jive with current connection. The PSH
- flag tells the receiver to pass all the data is has queued to the
- aplication, as soon as possible. The FIN flag is the way an application
- begins a graceful close of a connection (connection termination is a 4-way
- process). When one end receives a FIN, it ACKs it, and does not expect to
- receive any more data (sending is still possible, however))
- TCP/IP - Transfer Control Protocol/Internet Protocol
- TCSH / TSH - Turbo C Shell (an enhanced version of CSH. Usually located at
- /bin/tcsh or /usr/bin/tcsh)
- TDD - Telecommunication Device for the Deaf
- TDR - ime Domain Reflectometer (TDRs measure the propagation of fluctuation
- of electromagnetic waves. A TDR attached to your LAN will reveal
- unauthorized parties sucking data from your network. Hewlett Packard has
- one, and it's available at
- http://www.tmo.hp.com/tmo/pia/infinium/PIATop/datasheets/English/HP8147.html)
- TDT - The Dream Team (a hacking group)
- TERM - Terminal
- TERMCAP - Terminal Capabilities (see TERMCAPFILE)
- TERMCAPFILE - TERMinal CAPabilities FILE (a file mostly found on Unix
- systems (usually located at /etc/termcap, correct me if I'm wrong) which
- contains your terminal's capabilities. For example: if your terminal is a
- screen, it'll contain information about it, including it's size, available
- colors, resolutions etc')
- TFH - Thread from hell (a discussion that just won't die and is often
- irrelevant to the purpose of the forum or group) (mainly used in IRC)
- TFS - Tough Fucking Shit
- TGA - Truevision tarGA / Trusted Gateway Agent (see VVOS)
- TGIF - Thank God it's Friday (mainly used in IRC)
- TGOD / TG0D - The Guardians Of Data (a security group.
- otter.happyhacker.org)
- TGP - Trusted Gateway Proxy (see VVOS)
- TH - Trouble History
- THC - The Hacker's Choice (they make great hacker programs such as the
- amazing wardialer called THC-SCAN. They have a reputation for blowing away
- the competition and stomping very heavily on them.
- http://thc.inferno.tusculum.edu)
- THF - THe Hacker's Fun
- THG - The Humble Guys (a hacking group)
- THOF - The Hand Of Fate
- THP - The Hill People (a hacking group)
- THTJ - The Havoc Technical Journal (an independent zine)
- THX - Thanks (mainly used in IRC)
- TIA - Tuniaisn Internet Agency / Thanks In Advance (used if you post a
- question and are expecting a helpful reply) (mainly used in IRC)
- TIC - Tongue In Cheek
- TIES - Time Independent Escape Sequence
- TIF - Tagged Image File (format)
- TIFF - Tag Image File Format
- TIM - The Incredible Machine (an old computer game)
- TISC - The Internet Security Conference
- TLA - Three-letter acronym (mainly used in IRC)
- TLD - Top Level Domain
- TLK2UL8R - Talk to you later (mainly used in IRC)
- TLS - Transport Layer Security
- TMTOWTDI - There's More Than One Way To Do It (Perl's slogan. In case you're
- wondering, Perl is a programming language)
- TMW - TeleMate for Windows (a modem terminal program for Windows)
- TNO - The New Order (a hacking group)
- TOF - Top Of File
- TOP - Teflon Oil Patch (a program that binds two executable files together
- with many cool options)
- TOS - Terms Of Service / Type Of Service
- TPTB - The powers that be (mainly used in IRC)
- TRACERT - Traceroute (a Unix command. For more information, type 'man
- tracert' (without the quotes))
- TREAT - Trouble Report Evaluation and Analysis Tool
- TRSI - Tristar Red Sector Inc. (a hacking group)
- TSR - Terminate and Stay Resident (a program that remains alive at all
- times, constantly listening for a particular event. When that event finally
- occurs, the TSR undertakes some action)
- TTF - True Type Font
- TTFN - Ta-Ta for now (mainly used in IRC)
- TTL - Time To Live (the maximum times a data packet can bounce between a
- host to another host before it's deleted)
- TTY - TeleTYpe
- TTYL - Talk to you later (mainly used in IRC)
- TU - Thank you (mainly used in IRC)
- TUCOWS - The Ultimate Collection Of Winsock Software
- TUT - Tutorial
- TWAIN - Technology With / Without An Important / Interesting Name
- TWINKLE - The Weizmann Institute Key Locating Engine (a light-operated
- machine that can break any encrypted text or binary unless the key is larger
- than 516-bit. Twinkle is very different than that of the electronic design
- of a normal computer; Twinkle is based solely on optoelectronics, which use
- light to transfer info digitally. Shamir predicts that the Twinkle mechanism
- would be as effective as about 100 to 1,000 PCs. Not just that, but the
- machine could be easily built with little funding, Shamir says that a
- Twinkle machine could be built for as little as $5,000. On the other hand
- the DES Cracker cost the Us government $250,000 to build)
- TXT - Text
- TY - Thank You (mainly used in IRC)
- U/L / UL - Upload
- UAE - Unrecoverable Application Error (program crash)
- UAPITA - You're a pain in the ass (mainly used in IRC)
- UART - Universal Asynchronous Receiver/Transmitter
- UBE - Unsolicited Bulk e-mail
- UC / U C - You see, ... (mainly used in IRC)
- UCE - Unsolicited Commercial e-mail
- UCF - United Cracking Force (a cracking group)
- UCITA - Uniform Computer Information Transaction Act ((taken in part from
- hackernews.com) stupidest thing in the world. If this gets approved, vendors
- will have the right to repossess software by disabling it remotely (meaning
- you have to leave a port open on the firewall? Just imagine the DoS
- possibilities); prevent the transfer of licenses from one party to another
- without vendor permission (Does this include my copy of LoadRunner for the
- Atari2600 that I sold for $5?); outlaw reverse engineering (whoa, no more
- third party security analysis). This new law is being supported by such
- software giants as Microsoft, Adobe and WinPro. the proposed legislation is
- set to go before the National Conferences of Commissioners on Uniform State
- Laws in July. If this panel approves this measure it will then be sent to
- state legislations around the country (good way to bypass the feds). Lucky
- us (Njan, F a n G and R a v e N), we live outside the US. Let's just hope
- they won't approve such thing in our countries too)
- UDA - Universal Data Access
- UDP - User Datagram Protocol (see IP) / Usenet Death Penalty (when a UDP is
- implemented, the offender has five business days in which to respond. If
- they fail to resp ond or the response is insufficient, a message is sent to
- all ISP's to clock out the offender's posts.
- UETF - Undernet Engineering Task Force
- UH - Underground H@vock (http://uh1.cjb.net)
- UHA / UHA1 - United Hackers Association (http://www.uha1.com)
- UHC - United Hackers Convention (http://u-h-c.com)
- UHS - Universal Hint System (suppose you play an adventure game and you get
- stuck. Now, a fully-detailed walkthrough will ruin your entire gaming
- experience, right? That's what UHSs are for. Instead of telling you what to
- do, they give you clues and hints until you get it right. You can ask for
- more hints or more clues until they run out and only then, if you are stupid
- enough not to get it right after 117,538.2 hints you get the answer. Get
- UHSs at www.uhs-hints.com)
- UI - User Interface UID - Unique ID / User ID (a number corresponding to an
- account. uid=0 is root most of the times)
- UIN - Universal Identification Number (ICQ number)
- ULG - United Lone Gunmen (a hacking group)
- UNA / UNAB - Unabbreviate (see AB. To unabbreviate, type ':una blah' without
- the 's)
- UPS - Uninterruptable Power Supply
- UR - You Are / Your
- URL - Universal Resource Locator (also known as internet address)
- URSELF - Yourself
- US / U/S - Understand
- USB - Univeral Serial Bus (a new type of slot (those little things at the
- back of your PC). Faster than any other slots and has many advantages over
- other slots. What advantages, you ask? Oh, puh-leese. Too many. Go read a
- book or something. Or a magazine)
- USR - User
- UTIL - Utility
- UUCP - Unix to Unix Copy
- UUDW - Union of United Death Workers (a hacking group)
- UW - Ultra Wide [SCSI]
- UW - You're welcome (mainly used in IRC)
- VAN - Virtual Area Network
- VAR - Variable
- VB - Visual Basic (a programming language)
- VBG - Very Big Grin (mainly used in IRC)
- VBP - Visual Basic Project (a programming language)
- VBS - Visual Basic Scripting
- VBSEG - Very big S***-eating Grin (mainly used in IRC)
- VC - Virtual Coordinates
- VCD - Video Compact Disc
- VCPP - Visual C++
- VDE - Verona Desktop Enhancer
- VDSL - Very high BIT-rate Digital Subscriber Line (higher speeds than DSL,
- over shorter distances)
- VDU - Video Display Unit
- VER - Version
- VGA - Video Graphics Array (a monitor which supports 256 colors)
- VHDCI - Very High Density Cable Interconnect
- VI - VIsual editor
- VIA - Virtual Interface Architecture
- VM - Virtual Machine (VM programs (such as VMWare) allow Unix users to
- install multiple OSs on their box without the need to repartition, as if
- they were running several boxes)
- VMB - Voice Mail Box
- VMTP - Versatile Message Transport
- VNC - Virtual Network Computer (by IBM)
- VOIP - Voice Over Internet Protocol (with this little baby you can make
- phone calls through the internet so there is no such thing as a long
- distance call, only local calls)
- VPN - Virtual Private Network
- VR - Virtual Reality
- VRM - Voltage Regulation Module (regulates the voltage levels of your CPU.
- Included in all modern CPUs)
- VRML - Virtual Reality Modeling Language (if you've got the a VRML plug-in
- such as cosmoplayer (www.cosmoplayer.com) you can view 3D objects within
- webpages and interact with them. VRML can create movies and animations
- (including interactive animation and objects), 3D models that can be viewed
- from different angles and viewpoints and more)
- VRT - Vertical
- VT - Virtual Terminal
- VV - Virtual Vault (see VVOS)
- VVOS - Virtual Vault Operating System (HP's solution to secure electronic
- commerce. It's becoming very popular within big businesses like banks etc'.
- The main security mechanism in which VVOS is based upon is data
- partitioning. Data on the system is classified into one of four security
- classes, or "vaults" - INSIDE, OUTSIDE, SYSTEM and SYSTEM HIGH. The INSIDE
- vault generally contains the internet front end and any necessary CGI
- binaries, etc'. SYSTEm and SYSTEM HIGH are responsible for maintaining the
- external webpages and audit logs respectively. These vaults are totally
- segregated from each other and work essentially as seperate machines. If a
- program requires access to either of the vaults it must be authenticated by
- HP's Trusted Gateway Proxy daemon. The TGP daemon filters all requests from
- the internet and forwards the to middleware server packages that safely
- reside behind the INSIDE vault)
- VWM - Virtual Window Manager (a little program that allows you to have
- multiple desktops)
- VX / VX Community - Virus Exchange Community
- VXD - Virtual X (X=anything) Driver (Generally speaking, VxDs were written
- by Micro$oft for Windows to control a specific class of device such as
- printers, display adapters and etc. This allows a hardware manufacture to
- create small simple device drivers which contain only additional
- instructions needed for a specific device. These vender-supplied drivers are
- known as mini drivers. Many of these are also VxDs)
- W - Write / Word
- W/ - With
- W3 - WWW (stands for World Wide Web)
- W3C - WWW Consortium (WWW stands for World Wide Web)
- WAIS - Wide Area Information Server (an Internet system that enables
- concentrated searching for information from databases scattered among many
- servers)
- WAN - Wide Area Network
- WANG - Wide Area Network Group
- WAV - Wave
- WB - Welcome Back (mainly used in IRC)
- WDALYIC - Who died and left you in charge? (mainly used in IRC)
- WFM - Works for me (mainly used in IRC)
- WIBNI - Wouldn't it be nice if (mainly used in IRC)
- WIL - Windows Interface Language
- WINDOWS - Will Install Needless Data On Whole System ;)
- WKP - Well Known Port
- WM - Window Maker (a window manager for X-Windows, the popular GUI for Unix)
- WMA - Windows Media Audio
- WMF - Windows Meta File
- WO / W/O - without (mainly used in IRC)
- WON - World Opponent Network (a multiplayer gaming arena. www.won.net)
- WORM - Write Once, Read Many (a type of media that can be written on only
- once, but can be read from as much as the user wants (kinda like CDRs))
- WP / W/P - WallPaper / Word Processor / Word Perfect (a .doc editing
- software)
- WT? - What/who the? (mainly used in IRC)
- WTF - What the F***! (mainly used in IRC)
- WTFO - What the F***! Over! (mainly used in IRC)
- WTG - Way to go! (mainly used in IRC)
- WTGP? - Want to go private? (mainly used in IRC)
- WTV - Web TV
- WTZ-UP - Whats Up (mainly used in IRC)
- WU? - What's up? (mainly used in IRC)
- WUF? - Where are you from? (mainly used in IRC)
- WWW - World Wide Web (or World Wide Wait, as some people call it)
- WWWC - World Wide Web Consortium
- WYPIWYG - Where You Point Is Where You Go
- WYSIWYG - What You See Is What You Get (for example, Micro$oft Word is a
- WYSIWYG editor because it shows you what you'll get when you'll print your
- document. Old UNIX or DOS editors are mostly not WYSIWYG editors)
- WYSIWYG - What you see is what you get (mainly used in IRC)
- X - Execute
- XIG - Xi Graphics Inc (www.xig.com)
- XML - Extended Markup Language
- XMMS - X MultiMedia Systems (the best MP3 player for Unix. www.xmms.org)
- XMS - Extended Memory Specifications
- XNS-IDP / XNSIDP - Xerox NS IDP
- XOR - Exclusive OR (logic gate whose output is 1 if any, but not all, it's
- inputs are 1st; otherwise, zero (0) (pronounced ex-or))
- XP - Experience Point (when playing MUD your character is rated by an XP
- system. You get XPs for killing, learning, doing stuff or just hanging
- around. The more XPs you have the more powerful your character is)
- XPG - X/Open Portability Guide
- XTERM - XWindown Terminal (a terminal window that can be executed from
- XWindows, the UNIX equivelant for Microsoft's nice n' E-Z GUI)
- XTP - Xpress Transfer Protocol
- Y - Why (mainly used in IRC)
- Y2K - Year 2,000
- YAWS - Yet Another Wingate Scanner
- YBWC - Why? Because We Can
- YGBSM - You gotta be s***tin' me! (mainly used in IRC)
- YMMV - Your Mileage May Vary (mainly used in IRC)
- YMTC - You Make The Call
- YOYOW - You Own Your Own Words (this means that you are responsible for the
- words that you post and that reproduction of those words without your
- permission in any medium outside the distribution of where you post it may
- be challenged by you, the author)
- Yr - year
- Z - S (Z stands for S in many "h4x0rish" terms or "warez" terms)
- ZD - Zener Diode (semiconductor diode that has a well-defined turn-on
- voltage for conduction in the reverse direction)
- ZIP - Zone Information Protocol
- ZOU - Zone Of Unloaded (they've got some MP3s, cracks, games to download...
- a typical warez website. utenti.tripod.it/unload)
- ZSH - Z Shell (a UNIX shell. It's kinda like a combination of TCSH, BASH,
- KSH and others. It is fairly easy to "migrate" to ZSH since it emulates most
- shells. Usually located at /bin/zsh. For more info go to
- http://sunsite.auc.dk/zsh)
- ZV port - Zoomed Video Port
-
- [ -- Emoticons -- ]
- #-) - Stayed up too late / user partied all night
- #.-o - "Oh, nooooooo Mr. Bill!!!"
- %-) - stared at screen too long, cross-eyed
- %*@:-( - Hung over
- %-^ - User is another Picasso
- %-6 - Brain dead
- (-: - left-handed smiley
- (:)-) - Scuba diver
- (:-d) - Yum yum
- (:I - Egghead
- (:-q) - An indian
- (:-Q) - At the dentist clinic
- (:V) - Duck
- (-_-) - Secret smile
- (_8-(|) - Homer Simpson
- *#:-) - Scotsman wearing his Scottish tam
- *:o) - Bozo the clown
- *-{:-) - Smiley with a pon-pon hat
- *<:-) - Santa Claus
- *X* - Kiss
- ,-) , '-) - one-eyed wink
- -'-,-'{@ / -'-,-{@ - Rose
- ,-} - wry and winking
- .) - Keeping an eye out for you
- :-#| - Big mustache
- :-& - biting tongue
- :'-( - Crying
- :-( - Sad
- :-() - Surprised
- 8-| - Surprised
- :'-) - Crying of joy
- :-)' - drooling
- :-) - Smile
- -:-) - User sports a mohawk and admires Mr. T
- :-)) - Really happy
- :-)<>>>>> - Basic Smiley with a necktie
- :-)-8 - Big girl
- :-)8 - User is well dressed
- :-* - A kiss / ate something weird
- :* - Kisses
- :*) - Drunk
- :-*) , :-*> - drunken; clown
- :,( - Crying
- :-/ - Perplexed
- :-/ - Uhhh.... sure...
- ::POOF:: - Goodbye, leaving the room (mainly used in IRC)
- :-@ - screaming
- :[ - Boned
- :-[ - Vampire
- :-\ - User happens to be Popeye
- :] - Asleep...
- :-] - biting lip
- :-{ - Boo hoo / user is weeping
- :-{} - User with heavy lipstick
- :-| - "Have an ordinary day!" Smiley / grim / out of words
- :-'| - User has a cold
- :-|| - Mad
- :-} - Embarrassed smile / goat / smirk
- :}{: - Kisses (stolen from June bug)
- :~ - Also crying
- :-~~~ - Drooling
- :-< - Boo hoo / forlorn, very sad
- :<}) - User with mustache, smiling
- :-=) - Hitler (?)
- :-> - funny, happy, grinning, "hey hey"
- :-7 - wry statement
- :-8 - lying (speaking through both sides of mouth)
- :8-) - Glasses on nose
- :-8) - Glasses way on nose
- :-9 - Licking his lips
- :-b , :-p , :-▐ - sticking out tongue
- :-c - Bummed / sniff / unbelieving (dropped jaw)
- :-c - unhappy
- :-D - Big grin / lol
- :-e - Disappointed
- :-E - Vampire
- :G - Gee...
- :-j - Benjamin Netanyahu smiles / tongue in cheek
- :-J - Benjamin Netanyahu smiles / tongue in cheek
- :-o - Wow! / I'm surprised
- :P - Big, wide smile
- :-P - Sticking out your tongue
- :-P~ (may contain more than a single ~) - A lick / a tongue out / a really
- long tongue out (when
- :-s - bizarre comment, sarcastic
- :-t - Cross smiley
- :-v - Talking
- :-X , :-|| , :-# - "my lips are sealed"
- ;-( - crying
- ;-) - Smile with a wink
- ;-@ - swearing, angry
- ;-^) - Tongue in cheek
- @:- | ) - Elvis
- @= - Nuclear mushroom
- [:-) - Walking with a Walkman
- [:-|] - Robot
- {:() - A monkey/chimp
- |-) - Jordy from Star-Trek / sleeping / blind (to spot the obvious
- |^o - Snoring
- |-I - Sleeping
- |-O - Birth
- }8-P - Big, big smile
- ~.^ - Blink (one eye only)
- ~:o - baby (or behaving like one)
- +:-) - Doctor
- +-:-) - The pop
- <:I - Dunce
- =:-) - Punk rocker
- =:O - Frightened (hair standing on end)
- =|:-)= - Abe Lincoln
- =8O - Bug-eyed with fright
- >(oo)< - mad pig (candy, as in the food)
- >:-( - angry
- >:) - Mischievous grin / perplexed look
- >:-< - Mad
- >:-> - sarcastic, devilish grin
- >:-X - Angry
- ><<<*><*>>>< - Kissing Fish
- 0-) - Scuba diver
- 0:-) - Angel
- 3:[ - Bulldog smiling
- 3:-o - Cow
- 8-# - Dead
- 8:-) - Glasses on forehead / little girl
- 8:] - Normal smiling face of a gorilla
- 8-o - Very surprised / amazed
- |-o - Very surprised / amazed
- :-O - Very surprised / amazed
- 8-X - Afraid
- B-( - Sad / bored face
- B-) - Sun glasses
- C(: / :)D - Tongue out
- C|:-= - Charlie Chaplin
- C=:-) - Chef
- H-S - After eating something bad
- -O - "Wow!"
- O :-) - Angel
- oooo(0) (0)oooo - Toes
- S:8-( - Grandma
- X-( - Dead
- ^_^ - Rather stupidly smiling
- O_o - Hallucinated
- ñ_ñ - Hopeless/badly on drugs/desperate
- -_- - Sleeping /closing eyes
- ]-| - glass of wine
- )-| - glass of champagne
- >-| - an aperitif
-
- [ -- Guys You Don't Want To Mess With -- ]
- * FAPSI - Surveillance "which bugs communication channels of countries from
- outer space and also from ground based stations"
- * FSB - Russian Counter Intelligence
- * GRU - Military Intelligence
- * SVR - Foreign Intelligence
- ATF - The bureau of Alchohol, Tobacco and Firearms
- CERT - Computer Emergency Response Team (a hackers website with exploits,
- archives and advisories. They also hack racist websites)
- CIA - Central Intelligence Agency
- CRTC - Canadian Radio-television and Telecommunications Commosion
- DEA - Drug Enforcement Administration
- DISA - Defense Information System Agency
- DoD - The American Department of Defence / Department of Dead (from the game
- Grim Fandango)
- EFA - Electronic Frontiers Australia
- FBI - Federal Bureau of Investigation
- FBS - Federal Security Service
- FCC - Federal Communications Commision
- FEMA - Federal Emergency Management Agency
- FIDNET - Federal Intrusion Detection Network (an initiative to monitor the
- Internet as part of a cyber-crime-fighting effort)
- FIRST - Forum of Incident Response and Security Teams
- FSB - Russia's Federal Security Bureau (ex KGB)
- FTC - Federal Trade Commission
- GAO - General Accounting Office
- ILETS - International Law Enforcement Telecommunications Seminar ((taken
- from hackernews.com) ILETS was founded by the FBI in 1993 to push for
- wiretap abilities in worldwide communications and has been heavility
- involved with the ENFOPOL 98 Affair)
- KGB - the Russian Secret service (see FSB). Split into 4 branches:
- MoD / MOD - Ministry of Defense (the British equivalent of the DoD)
- NATO - North Atlantic Treaty Organization
- NCCUSL - National Conference of Commissioners on Uniform State Laws
- NIPC - National Infrastructure Protection Center
- NIST - National Institute of Standards and Technology
- NSA - National Security Agency
- NSIRC - National Security Incident Report Center
- SMERSH - (from Smert' Shpionam or "Death to Spies". They used to kill
- hackers because they counted as spies...)
- UCITA - Uniform Computer Information Transaction Act
- USA - United States of America (like you didn't know this one)
- USAF - United States Air Force
- USDI - United States Department of Interior
- USIA - United States Information Agency
- USSR - Union of Soviet Socialists Republics
- USSS - United States Secret Service
-
- [ -- Country Codes/Internet Extensions -- ]
- AC - Academic (means that this is an academic domain. For example:
- harvard.ac)
- AD - Andorra
- AF - Afghanistan
- AG - Antigua and Barbuda
- AI - Anguilla
- AL - Albania
- AM - Armenia
- AN - Netherlands Antilles
- AO - Angola
- AQ - Antarctica
- AR - Argentina
- AS - American Samoa
- AT - Austria
- AU - Australia
- AW - Aruba
- AZ - Azerbaijan
- BA - Bosnia and Herzegowina
- BB - Barbados
- BD - Bangladesh
- BE - Belgium
- BF - Burkina Faso
- BG - Bulgaria
- BH - Baharain
- BI - Burundi
- BJ - Benin
- BM - Bermuda
- BN - Breunei Darussalam
- BO - Bolivia
- BR - Brazil
- BS - Bahamas
- BT - Bhutan
- BV - Bouvet Island
- BW - Botswana
- BY - Belarus
- BZ - Belize
- CA - Canada
- CC - Cocos (Keeling) Islands
- CD - Congo, The Democratic Republic of the
- CF - Central African Republic
- CG - Congo
- CH - Switzerland
- CI - Cote D'ivoire
- CK - Cook Islands
- CL - Chile
- CM - Cameroon
- CN - China
- CO - Colombia
- COM - Commercial (means that the owner of this domain set it up in order to
- make money out of it)
- CR - Costa Rica
- CU - Cuba
- CV - Cape Verde
- CX - Christmas Island
- CY - Cyprus
- CZ - Czech Republic
- DD - German Democratic Republic (obsolete: assigned in 1983, never
- connected)
- DE - Germany
- DJ - Djibouti
- DK - Denmark
- DM - Dominica
- DO - Dominican Republic
- DZ - Algeria
- EC - Ecuador
- EDU - Educational (meaning this domain exists for educational purposes)
- EE - Estonia
- EG - Egypt
- EH - Western Sahara
- ER - Eritrea
- ES - Spain
- ET - Ethiopia
- FI - Finland
- FJ - Fiji
- FK - Falkland Islands (Malvinas)
- FM - Mocronesia, Federated States of
- FO - Faroe Islands
- FR - France
- FX - France, Metropolitan
- GA - Gabon
- GB - United Kingdom
- GD - Grenada
- GE - Georgia
- GF - French Guiana
- GH - Ghana
- GI - Gibraltar
- GL - Greenland
- GM - Gambia
- GN - Guinea
- GP - Guadeloupe
- GQ - Equatorial Guinea
- GR - Greece
- GS - South Georgia and the South Sandwich Islands
- GT - Guatemala
- GU - Guam
- GW - Guinea-Bissau
- GY - Guyana
- HK - Hong Kong
- HM - Heard and Mcdonald Islands
- HN - Honduras
- HR - Croatia (local name: Hrvatska)
- HT - Haiti
- HU - Hungary
- ID - Indonesia
- IE - Ireland
- IL - Israel (R a v e N and F a n g's home!!)
- IN - India
- INT - International
- IO - British Indian Ocean Territory
- IQ - Iraq
- IR - Iran, Islamic Republic of
- IS - Iceland
- IT - Italy
- JM - Jamaica
- JO - Jordan
- JP - Japan
- K12 - kinda like EDU, I think (the only K12 domains I (R a v e N) know are
- domains set up by the ministry of education in my country)
- KE - Kenya
- KG - Kyrgyzstan
- KH - Cambodia
- KI - Kiribati
- KM - Comoros
- KN - Saint Kitts and Nevis
- KP - Korea, Democratic People's Republic of
- KR - Korea, Republic of
- KW - Kuwait
- KY - Cayman Islands
- KZ - Kazakhstan
- LA - Lao People's Democratic Republic
- LB - Lebanon
- LC - Saint Lucia
- LI - Liechtenstein
- LK - Sri Lanka
- LR - Liberia
- LS - Lesotho
- LT - Lithuania
- LU - Luxembourg
- LV - Latvia
- LY - Libyan Arab Jamahiriya
- MA - Morocco
- MC - Monaco
- MD - Moldova, Republic of
- MG - Madagascar
- MH - Marshall Islands
- MK - Macedonia, the Former Yugoslav Republic of
- ML - Mali
- MM - Myanmar
- MN - Mongolia
- MO - Macau
- MP - Northern Mariana Islands
- MQ - Martinique
- MR - Mauritania
- MS - Montserrat
- MT - Malta
- MU - Mauritius
- MV - Maldives
- MW - Malawi
- MX - Mexico
- MY - Malaysia
- MZ - Mozambique
- NA - Namibia
- NC - New Caledonia
- NE - Niger
- NF - Norfolk Island
- NG - Nigeria
- NI - Nicaragua
- NL - Netherlands
- NO - Norway
- NP - Nepal
- NR - Nauru
- NU - Niue
- NZ - New Zealand
- OM - Oman
- ORG - Organization (means that the owner of this domain set it up for
- non-profit purposes)
- PA - Panama
- PE - Peru
- PF - French Polynesia
- PG - Papua New Guinea
- PH - Philippines
- PK - Pakistan
- PL - PolandPM - Saint Pierre and Miquelon
- PN - Pitcairn
- PS - Palestinian Authority
- PR - Puerto Rico
- PT - Portugal
- PW - Palau
- PY - Paraguay
- QA - Qatar
- RE - Reunion
- RO - Romania
- RU - Russian Federation
- RW - Rwanda
- SA - Saudi Arabia
- SB - Solomon Islands
- SC - Seychelles
- SD - Sudan
- SE - Sweden
- SG - Singapore
- SH - Saint Helena
- SI - Slovenia
- SJ - Svalbarb and Jan Mayen Islands
- SK - Slovakia (Slovak Republic)
- SL - Sierra Leone
- SM - San Marino
- SN - Senegal
- SO - Somalia
- SR - Suriname
- ST - Sao Tome and Principe
- SV - El Salvador
- SY - Syrian Arab Republic
- SZ - Swaziland
- TC - Turks and Caicos Islands
- TD - Chad
- TF - French Southern Territories
- TG - Togo
- TH - Thailand
- TJ - Tajikistan
- TK - Tokelau
- TM - Turkemenistan
- TN - Tunisia
- TO - Tonga (know those cool V3 URLs? http://come.to/your-website,
- talk.to/someone etc'? Do you know how http://www.come.to and many other
- websites with a .to extension got this URL without actually being in Tonga,
- which is a rather small and undeveloped country? Well, they bought the
- extension from the kind of Tonga for... uh... what the heck, read their FAQ)
- TP - East Timor
- TR - Turkey
- TT - Trinidad and Tobago
- TV - Tuvalu (see comments regarding TO)
- TW - Taiwan, Province of China
- TZ - Tanzania, United Republic of
- UA - Ukraine
- UG - Uganda
- UM - United States Minor Outlying Islands
- US - United States
- UY - Uruguay
- UZ - Uzbekistan
- VA - Holy See (Vatican City State)
- VC - Saint Vincent and the Grenadines
- VE - Venezuela
- VG - Virgin Islands (British)
- VI - Virgin Islands (U.S.)
- VN - Vietnam
- VU - Vanuatu
- WF - Wallis and Futuna Islands
- WS - Samoa
- YE - Yemen
- YT - Mayotte
- YU - Yuguslavia
- ZA - South Africa
- ZM - Zambia
- ZR - Zaire
- ZW - Zimbabwe
-
-
-
-