Mega List of Computer Acronyms

Here is probably the biggest list of computer acronyms collated on a single webpage. Refer and enjoy!!!

@ – At (mainly used in IRC but is also used in email addresses. If you don’t know what I mean STOP READING NOW!!! Example: lol@RaveN=LOL (Loughing Out Loud) at RaveN)
10Q – Thank You (mainly used in IRC)
10X – Thanks (mainly used in IRC)
2 – Too / Two / To (mainly used in IRC. Example: me2=me too)
4 – For / Four (mainly used in IRC. Example: 4u=for you)
8 – Ate (mainly used in IRC. Example: l8r=Later)
A/S/L – Age/Sex/Language / Age/Sex/Location
A/UX – (A version of UNIX based on V system and UNIX 2 that works on Mac II)
AAA – Access All Areas (a security group.
AAM – Ask A Minor (mainly used in IRC)
AB – Abbreviate (a VI command. Type ‘:ab blah halb’ without the ‘s and whenever you type blah (case sensitive + whole word) it will automatically replace it with halb. More info and VI tutorials on
AC – Alternating Current / Analogical Computer
ACCT – Account
ACD – Automatic Call Distributor
ACE – Adaptive Communication Environment
ACID – Atomicity, Consistency, Isolation and Durability
ACID / AciD – Ansi Creators in Demand (a hacking group)
ACK – Acknowledged (first, a little about the TCP protocol. When you want to send something from one computer to another using TCP you need to establish a connection first. The sender first sends a packet with the SYN flag on. On this point, the receiver can decide if he wants that packet. If a firewall is blocking the way or there is no daemon on the specific port the packet will be denied and the receiver will reply with a packet with the RST flag on. However, if the receiver wishes to accept the connection, he will reply with both SYN and ACK on, and then the sender should reply with ACK, which means he’s ready to send. This whole thing is called a “TCP 3-Way Handshake” and it is good for transferring files which must not be corrupted, since there is no packet loss, and when something goes wrong the receiver can ask the sender to send that packet again. On UDP, you can’t make sure the packet will ever get to the receiver but everything goes a lot faster that way. This is why Realplayer ( uses UDP. This is why video and audio sometimes gets a little smudged on the way (just a little? Hehe…). But in case you want to transfer applications or games, you cannot afford to lose a single BIT, because if you would the program would probably get corrupted. In such cases, you have to use TCP, which is a bit slower but you don’t have to worry about losing important pieces of information. More info at the entry TCP)
ACL – Access Control List (a list containing info about which user can access which parts of, say, a hard drive)
ACM – Association for Computing Machinery
ACTLAB – Advanced Communication Technologies Laboratory
ADC – Analog-to-Digital Conversion / Advanced Disk Catalog (
ADFS – Advanced Disk FIling System (what new(ish))acorns and upgraded BBC’s use to handle floppy disks)
ADMIN – Administrator
ADN – Any day now (mainly used in IRC)
ADO – ActiveX Data Objects
ADPCM – Adaptive Differential Pulse-Code Modulation
ADPCM – Adaptive Digital Pulse Code Modulation
ADSL – Asymmetric Digital Subscriber Line
ADSL – Asymmetric Digital Subscriber Line
AEP – Apple talk Echo Protocol
AES – Advanced Encryption Standard (quoted from Packet Storm Security – the AES will be the eventual replacement for DES. It’s a 128-BIT block cipher with key lengths of 128, 192, and 256 BITs)
AF – Audio Frequency
AFAIK – As Far As I Know (mainly used in IRC)
AFK – Away From Keyboard (mainly used in IRC)
AFS – Andrew File System
AGNPAC – Alberta Government Packet Switched Network
AGP – Accelerated Graphics Port
AGP – Advanced Graphics Port
AI – Artificial Intelligence
AIFF – Audio Interchange File Format
AIM – AOL Instant Messenger (a competitor to ICQ)
AIN – Advanced Intelligent Network
AIX – Advanced Interactive eXecutive (A version of UNIX)
AJ – Ask Jeeves (a cool search engine. Ask it any question that has the answer to it somewhere on the web and it’ll answer. But watchit, he’s got bad breath… lol…
AL – Artificial Life
ALGOL – ALGOrithmic Language
ALRU – Automatic Line Record Update
ALU – Arithmetic-Logic Unit
AMC – ATI Multimedia Channel (a nice connector that can be placed on the back of your computer. If you use ATI products then as soon as a new add-on comes out, like a new TV-Tuner or something, you can just plug it into the AMC)
AMPS – Advanced Mobile Phone Service
AMV – Advanced Mail list Verify (
AN – Associated Number
ANI – Automatic Number Identification
ANSI – American National Standards Institute
ANSIR – Awareness of National Security Issues and Response
AO – Anti Online (
AOE – Age Of Empires (a strategy game by Microsoft’s game development division. Some people consider it the best strategy game ever, or at least one of the best. Obviously, they’re all a bunch of pee-brained drooling maniacs. No offense, but I personally think this game… umm… what’s that word? Oh, yeah… SUCKS!!!)
AOL – America OnLine
AOP – Auto OP (if you’re an AOP of a channel it means you automatically receive OP whenever you enter than channel)
APA – All Points Ahead
API – Application Program Interface (an interface used to program applications. It is a part of an OS that gives applications an identical user interface)
APL – A Programming Language
APM – Advanced Power Management
APNIC – the European and Asia Pacific registries
APP – Application
APPC – Advanced Program to Program Comunication
APPROX – Approximately
APT – About Phreakin Time (a security-related magazine.
ARCNet – Attached Resource Computer Network
ARE – Acronym-rich environment (mainly used in IRC)
ArKey / AK – Argued Key
ARP – Address Resolution Protocol (gives addresses to workstations on a local network)
ARPA – Advanced Research Projects Agency (see ARPANet)
ARPANet – Advanced Research Projects Agency Network (a computer network that was established by the army in the late 60s for research and military purposes and eventually mutated into today’s Internet, once it became open for the masses in the early 90s)
ARSB – Automated Repair Service Bureau
ART – Advanced Registry Tracer (
AS – Autonomous System / Address Strobe / Half an A-Level
ASA – Advanced SCSI Architecture
ASCII – American Standard Code for Information Interchange
ASCII -American Standard Code for Information Interchange (basically the character set your computer uses)
ASCSI – Advanced Small Computer Systems Interface
ASI – Asynchronous SCSI Interface
ASIC – Application Specific Intergrated Circuit
ASIN – Amazon Standard Item Number (every affiltrate knows that every item (a music CD, a book or a video) has an ASIN. If you want to recommend about books, music CDs or videos in your website and then let your visitors to buy it all you have to do is to subscribe to’s affiltrates program (there’s a link to yet in their home page) and then find the ASIN of the product of your choice and follow their instructions)
ASIO – Australian Security Intelligence Organization
ASM / AS – Anti-Social Magazine (a well known hacking magazine)
ASP – Active Server Page (by Micro$oft. Kinda like a dynamic web page. For example: it can receive parameters from you, such as stocks you want to look up, and it will display them with nice graphs next to them or something)
ASPI – Advanced SCSI Programming Interface
ATA – Advanced Technology Attachment
ATAPI – ATA Packet Interface
ATH – Abbreviated Trouble History
ATL – Active-X Template Library
ATM – Asynchronous Transfer Mode / At The Moment (mainly used in IRC) / Automatic Teller Machine (those machines at banks who give you money in exchange for plastic cards and may sometimes eat your card if you’ve been naughty and spent all of your allowance. Naughty, naughty!)
ATP – Apple Talk transaction Protocol
ATRAC – Adaptive TRansform Acoustic Coding
ATTRIB – Attribute
AUI – Attachment Unit Interface
AUP – Acceptable User Policy
AURP – Apple talk Update-based Routing Protocol
AVI – Audio Visual Interface (an extremely lame computer video format, used mainly by Micro$oft… Surprise, surprise)
AVP – Aliens Vs. Predators (an online multiplaying game)
AW97PR – Advanced Word 97 Password Recovery (see
AWG – American Wire Gauge
AZ – Abstract Zero (a hacking group, now in the ownership of PE (Pirated Education))
b – BIT
B – Byte
B4 – Before (mainly used in IRC)
B4BO / B4B0 – Bah Boh (a cool hacking magazine.
B4N – Bye for now (mainly used in IRC)
BAK – Back at the keyboard (mainly used in IRC) / Backup (An extension often used under DOS to mark backup copies of files)
BASH – Bourne Again Shell (a Unix shell. Usually located at /bin/bash)
BASIC – Beginner’s All Purpose Symbolic Instruction Code (a programming language) / Bill’s Attempt to Seize Industry Control ;)
BAT – Batch (a batch file is a plain text file that consists of commands that will be sent to the command prompt whenever the file is executed)
BB – Big Brother ((as described by Packet Storm Security) Big Brother is a combination of monitoring methods. Unlike SNMP where information is just collected and devices polled, Big Brother is designed in such a way that each local system broadcasts it’s own information to a central location. Simultaneously, Big Brother also polls all networked systems from a central location. This creates a highly efficient and redundant method or proactive network monitoring. It also has blinking lights that make it look really cool. Features: Web-based status display, Configurable warning and panic levels, Notification via Pager or email, Support for grouping of machines, support for modem monitoring, Selectable paging delays, Heterogeneous Network Support. Monitors: dns nntp ftp smtp and pop3 testing, connectivity via ping, http servers up and running, disk space usage, uptime and cpu usage, essential processes are still running, messages and warnings. By Sean MacGuire)
BBAS – Beige Box Advanced System
BBIAB – Be back in a bit (mainly used in IRC)
BBL – Be Back Later (mainly used in IRC)
BBNW – BB for NetWare
BBS – Bulletin Board System
BCAS / B-CAS / BKAS / B-KAS – Because (mainly used in IRC)
BDR – Bus Device Request
BEDO DRAM – Burst Extended Data Output DRAM
BEG – Big evil grin (mainly used in IRC)
BFD – Big fucking deal (mainly used in IRC)
BFN – Bye for now (mainly used in IRC) / Big Freakin’ Number (mainly used in IRC)
BG – Big grin (mainly used in IRC)
BGP – Border Gateway Protocol
BIN – Binary
BIOS – Basic Input/Ouput System
BIOYIOP – Blow it out your I/O port (mainly used in IRC)
BIT – BInary digiT
BL – Belly laughing (mainly used in IRC)
BMP – BITmap (a basic image file)
BNC – Bouncer
BNET – Battle Net (Blizzard’s multiplayer gaming arena. or
BO – Back Orifice (one of the most famous Remote Administration trojans, made the CDC. Once you run the server file, anyone with the client program or a simple telnet application can access your computer. Basically it installs a backdoor on your computer. The backdoor can be locked with a password so only the person who sent you the server file in the first place can access the backdoor. OK, unless the password gets mysteriously hacked… the server file only works on Windows but the client works from either Windows or UNIX. The UNIX version is open-source. BO and NB are the two most common trojans. While NB is super simple, BO is a little more complicated but is still lame)
BO2K – Back Orifice 2,000 (another version of BO by cDc)
BOC – Bell Operating Company
BOD – BO Detect (one of the best BO detection programs.
BOE – BO Eliminator (one of the best BO detection programs. If you know the URL, please contact R a v e N at
BOF – Buffer Overflow
BOR – Basic Output Report
BOSS – Business Office Servicing System
BOTEC – Back-of-the-envelope calculation (mainly used in IRC)
BOW – Brotherhood Of Warez (a parody e-zine of “warez d00dz” and “h4x0rs” alike, which could be compared to “Da H4x0r BrUdAz (see jargon dictionary,
BPI – Bytes Per Inch
BPP – Bytes Per Pixel (how many bytes are needed to define the color of a single pixel (a dot). 8 BPP gives you a maximum color palette of 256 colors, 16BPP is 65530 (or a similar number… I keep forgetting this number), etc’ etc’)
BPS – Bytes Per Second (the amount of bytes that are transferred per second on the current connection speed)
BPX – Break Point on eXecution
BRB – Be Right Back (mainly used in IRC and ICQ)
BS – Black Sun (see BSRF)
BSA – Business Software Alliance
BSC – Binary Synchronous Communication protocol
BSD – Berkeley Software Distribution
BSH – Bourne Shell (a Unix shell. Usually located at /bin/bsh or /bin/old/sh or /usr/bin/old/sh)
BSOD – Blue Screen Of Death
BSRF – Black Sun Research Facility (our website.
BTA – But then again… (mainly used in IRC)
BTW – By The way (mainly used in IRC and ICQ)
BW / B&W / B/W – Black and White (usually referred to monitors or pictures, meaning black and white monitors or black and white pictures)
BWC – Because We Can
BX – BitchX (an IRC client.
C – See (mainly used in IRC)
C&C – Command & Conquer (a series of strategy games by Westwood. Considered to be the best of it’s kind)
C&C: RA / C&CRA / RA – Command & Conquer: Red Alert (a game in the C&C series. See C&C)
C&C: TS / C&CTS / TS – Command & Conquer: Tiberian Sun (a game in the C&C series. See C&C)
CA – Cable
CAB – Cabinet file (it’s some type of a compression Micro$oft often use, not to confuse with InstallShield CAB files)
CAD – Computer-Aided Design
CAF – Crackers Against Fakes (a hacking group)
CALC – Calculator
CALEA – Communications Assistance for Law Enforcement Act
CAM – Common Access Method
CAM – Computer Aided Manufacturing
CAPS – Computer-Assisted Passenger Screening (computer programs that go over all the passengers lists and compares them with terrorists’ profiles. If a passenger matches or is chosen at random “extra care” will be given to his luggage)
CARPC – Connected Car PC (Intel’s attempt to take over the car industry. It’s like a car with tons of computers and stuff in it. You know, satellites, Internet access, TV… ahh, the good life)
CATE – Computer Aided Test Engineering
CATS – Computer Assistance, Training and Services Inc
CBM – CAM-Brain-Machine
CC – C Compiler / Carbon Copy / Credit Card
CCC – Chaos Computer Camp (a hacking convention. Everything from hacking to lock picking)
CCD – Charge-Coupled Device
CCi / CCI – Cybercrime International (a hacking group)
CCS – Common Command Set
CD – Compact Disc / Change Directory (a command used both in UNIX and DOS. Usage: cd directory will get you to that directory. If there is a sub directory called foobar on your current directory (the directory you are in right now) the command cd foobar will get you there (this is called a relative path). You can also use cd like this: cd /etc to get to /etc on UNIX or cd windows/system to get to windows/system on DOS (supposing there are such directories))
CDA – Computer Decency Act
CDC / cDc – Cult of the Dead Cow (a hacking group. Famous for their Unix/Windows to Windows remote administration trojan, BO)
CDE – Common Desktop Environment
CDEV – Control panel DEVice (Mac)
CDI – Compact Disk Interactive
CDR – Coreldraw DRawing /
CDROM – Consumer Device, Rendered Obsolete in Months ;)
CDRW – Compart Disk ReWriteable (most CD burners can’t write on parts of a CD that were already written on, because a CD burner is basically a laser that burns tiny little holes into the CD. But not a CDR. A CDR can rewrite on such areas, but only on special CDs, also called CDRs)
CDW – Compact Disk Write (a CD burner)
CELP – Cache Enabled Low Profile
CELP – Code Excited Linear Prediction
CERT – CERT is a CMU affiliate (sub organization) which just releases vulnerability statements
CESA – Cyberspace Electronic Security Act
CFG – Configuration
CFS – Cryptographic File System
CGA – Color Graphics Adapter (one of the first color monitor. Supports 4 colors) / Computer Generated Animation (what’s there to say? Any kind of animation, 2D or 3D, which has been created by a computer)
CGI – Common Gateway Interface (it’s a way for users to submit requests and have the server perform some functions, typically a function that is native to the OS of the system, to either send a more “dynamic” response to the user, or to gather information about the user)
CGM – Computer Graphics Metafile
CHAP – Challenge Handshake Authentication Protocol
CHECKSUM – Summation Check
CHMOD – Change Mode (a UNIX command. If you own a file you can set the permissions for it. For more info type man chmod)
CHOWN – Change Owner (a UNIX command. If you own a file you can make someone else the owner but you will lose ownership of that file unless you are root. Owning a file means that not only if someone will check who owns that file it’ll show your username, it also means that you can run chmod on it etc’ etc’. If you don’t own a certain file, you can read, write or execute it only if the owner lets you. For more info, type man chown)
CIR – Committed Information Rate
CIS – Compuserve Information Services
CISC – The Complex Instruction Set Computer
CISPPP – Compuserve Information Services Point to Point Protocol
CIV – Civilization (a series of computer strategy and development games by Sid Meiers. Considered to be the best series of strategy and development games on the galaxy. The company that distributes this game is Activision)
CIV:AC / CIVAC / AC – Civilization: Alpha Centaury (a part of the CIV series. See CIV)
CIV:CTP / CIVCTP / CTP – Civilization, Call To Power (the only game in the CIV series that really stinks)
CIVII – Civilization II (see CIV)
CJ – Cracker Jack (a Unix password cracker)
CMC – Construction Maintenance Center
CMEINEL – Carolyn Meinel (see
CMOS – Complementary Metal Oxide Semiconductor
CMP – Computer Maintance Port
CMYK – Cian Magenta Yellow blacK
CNID – Calling Number IDentification
CO – Central Office
COAS – Caldera Open Administration Tool
COBOL – Completely Obsolete Business Oriented Language ;)
COCOT – Customer Owned Coin Operated Telephone
COE – Central Office Equipment
COM – Component Object Model / Command (when referring to DOS filename extensions)
COMP – Computer
CON – Convention / Conference
CONF – Confidential / Configuration / Configure
CONFIG – Configuration
COPA – Child Online Protection Act
COSMOS – Computer System for Main Frame Operations
COTM – Code Of The Month
CP – Copy
CPC – Cost Per Click (suppose you have a website and you get some sponsors to put their banners in it. Now, one of the paying methods is CPC, meaning you get paid a couple of cents whenever someone clicks on a banner on your website)
CPH – Common Purpose Hackers (a hacking group.
CPM – Cost Per Media (the amount of money you have to pay per exposures when advertising on the net. This can change according to several extremely boring factors)
CPP – C Plus Plus (a programming language)
CPU – Central Processing Unit
CR – Carriage Return (a system character used by DOS and DOS-based OSs (such as Winblows). It is a special ASCII character called Carriage Return which, when followed by an LF (Line Feed) char, means “end of line” in a DOS/Windows text file)
CRC – Cyclic Redundancy Check (when you extract a compressed/archived file, your extracting program will make sure that the number of characters in the extracted file is identical to the number of characters the same file had before it was compressed. This is called a CRC)
CRSAB – Centralized Repair Service Answering Bureau
CRT – Cathode Ray Tube (a very common type of computer monitors)
CRYPTO – Cryptography
CS – CompuServe (see CSERVE)
CSERVE – CompuServe (an ISP with it’s own little network, as well as Internet access. Kinda like AOL, only it doesn’t suck that much)
CSH – C Shell (no, it doesn’t have anything to do with sea shells. Just another Unix shell. Usually located at /bin/csh)
CSS – Cascading Style Sheet
CSU – Computer Surplus Outlet
CTCP – Client To Client Protocol (
CTCPEC – Canadian Trusted Computer Product Evaluation Criteria
CTR – Click Through Rate
CU – See you (mainly used in IRC)
CUD – Computer Underground Digest (a security-related e-zine (Electronic-Magazine))
CUDN – Common User Data Network
CUL – See you later (mainly used in IRC)
CUL8ER – See you later (mainly used in IRC)
CUR – Cursor
CWD – CyberWare Dispatch
CYA – Cover your ass / See ya (mainly used in IRC)
CYMK – Cyan Yellow Magenta blacK
CYO – See you online (mainly used in IRC)
D – Daemon (HTTPD = HTTP Daemon, FTPD = FTD Daemon, SMTPD = SMTP Daemon etc’) / Demo (a demonstration version of some kind of a software. A demo software would contain limited options, a demo game would contain only a couple of levels, etc’)
D/C – Disconnect
DA – Download Accelerator
DACL – Discretionary Access Control List
DAO – Data Access Objects
DARK-E / DARKE – Dark Eclipse Software (
DARPA – Defense Advanced Research Projects Agency
DAT – Data
DB – Database
DBA – Doing Business As (mainly used in IRC)
DBCS – Double Byte Character Set
DBMS – Database Management Systems
DC – Differentiating Current / Disconnect / Device Coordinates
DCB – Disk Coprocessor Board
DCC – Direct Cable Connection / Direct Card Calling / Direct Client Communication (used to transfer files in IRC)
DD – Double Density (a type of a floppy disk)
DDD – Direct Distance Dialing
DDE – Dynamic Data Exchange
DDL – Direct Devide Library
DDS – Direct Digital Sampling
DDX – Dialog Data Exchange
DEC – Do Expect Cuts ;) / Digital Equipment Corporations
DEEP / dEEP – Drinking Evil Elite Phreakers (
DEF – Default
DEFCON – DEFense CONdition / DEF CONvention (a hackers convention held each year on Las Vegas)
DER – Distinguished Encoding Rules
DES – Data Encryption Standard
DESC – Description
DFLA – Disenhanced four-letter acronym (that is, a TLA) (mainly used in IRC)
DFS – Disk filing System (what old acorns and BBC’s used to handle floppy disks
DHCP – Dynamic Host Configuration Protocol
DHP – Data Haven Project (
DHTML – Dynamic HTML
DIB – Device Independent Bitmap
DIC – Dictionary
DIG – Domain Internet Groper
DIKU – Do I know you? (mainly used in IRC)
DISA – Defense Information System Agency
DISC – Disconnection / Disconnecting (mainly used in IRC)
DISTRO – Distribution
DITYID – Did I tell you I’m distressed? (mainly used in IRC)
DL / D/L – Download
DLL – Dynamic Link Library (an application extension, loaded and unloaded automatically by applications during it’s execution. The beauty in DLLs is that they can be unloaded when they’re not necessary anymore to free up some memory and can also be shared betweens programs to free up some HD space)
DND – Do Not Disturb (mainly used in IRC and ICQ)
DNS – Domain Name Service
DOLM – Date Of Last Change
DoS – Denial of Service (not to be confused with DOS. A DoS attack is basically a way to prevent a person from using one, several or all the services that his computer offers. The most popular (and lamest) DoS attack is winnuke, which can be launched from Windows or Unix and can crash your Win95 box unless you’ve got a patch against it. It is considered lame because it’s very easy to launch and the chances that your target is unpatched are very small)
DOS – Disk Operating System (all older OSs were loaded from the BIOS. Correct me if I’m wrong) / Defective Operating System ;)
DPI – Dots Per Inch
DPMS – Desktop Power Management System (the system that is in charge of all that has to do with powering your computer)
DPS – Dead Protocol Society (a hacking group)
DQMOT – Don’t quote me on this (mainly used in IRC)
DRAM – Dynamic RAM
DRDRAM – Direct Rambus DRAM
DRV – Driver (a file that contains necessary information for an OS to use a certain devide on your computer)
DSL – Digital Subscriber Line(loop) (A family of digital telecommunications protocols designed to allow high speed data communication over the existing copper telephone lines between end-users and telephone companies)
DSS – Decision Support System / Darkridge Security Solutions
DTMF – Dual Tone Multi Frequency
DUN – Dial Up Networking (this little winblows program that gets you on the internet. Win95 comes with version 1.1 but is upgradable while 98 comes with 1.3. Go search micro$ for differences, FAQs and downloads. DO NOT install over win95 unless you’re completely certain you want to do this)
DV – Digital Videotape
DVD – Digital Video Disc
DW – Disc World (a rather large series of books, two computer adventure-game and a TV show. Very funny! Go get the game)
DWII – Disc World II (the sequel to the computer adventure-game Disc World. See DW above)
E – Error
EA – Electronic Arts
EASI – Enhanced Asynchronous SCSI Interface
EAX – Environmental Audio Expansion
EBCDIC -Extended Binary Coded Decimal Interchange Code
ECC – Enter Cable Change / Elliptic Curve Cryptosystem
ED – Editor
EDO – Extended Data Out
EFF / EFFNet – Electronic Freedom Foundation Network (see
EFNet – Eris Free Network (the famous (and one of the oldest) IRC server. It is reputed as a “war ground” for IRC wars (flooding, channel takeovers, kicking people you don’t like off IRC or a specific channel/channels, “nuking” people etc’) since you are allowed to do whatever you want but you may not like what others might do to you… ;) more info on IRC and other IRC servers at
EFR – Enhanced Full Rate
EFS – Encrypting File System
EG – Evil grin (mainly used in IRC)
EG Hackers / EG-Hackers / EGHACKERS – United Egyptian Hackers (another lame hacking page.
EGA – Enhanced Graphics Adapter (a monitor which supports 16 colors)
EGD – Entropy Gathering Daemon ((Taken From Packet Storm Security) a standalone daemon that sits around running various statistics collection programs (ps, vmstat, iostat, etc). It hashes the results into an “entropy pool”. If things happen on your system at relatively random and unpredictable times, then some of that randomness will become a part of the entropy pool and can be used to egnerate random numbers. It is basically a user-space implementation of the Linux kernel /dev/random device. As such, it should be runnable on all Unix-like systems. It is intended to make up for the lack of /dev/random on non-Linux systems so that programs like GPG can be used safely. Made by brian Warner)
EGREP – Extended GREP
EIA/TIA-232 – Eletronic Industries Assoation/Telecommunication Industry Association Recommended Standered 232
EJM – Expert Judgement Model
ELF – Extremely Low Frequency
E-MAIL – Electronic Mail
EMFBI – Excuse me for butting in (mainly used in IRC)
EMI – Electro-Magnetic Interface
EMM – Expanded Memory Manager
EMP – Electro Magnetic Pulse
EMS – Extra Memory Specifications
EMU – Emulator (a program that emulates something. For example: a Linux emulator for Windows allows you to run Linux from Windows. Unfortunately most EMUs are unstable and aren’t very “complete”)
E-NUF / ENUF – Enough (mainly used in IRC)
EOA – End Of Article
EOC – End Of Commentary
EOD – End Of Diatribe
EOF – End Of File
EOM – End of message (mainly used in IRC)
EOT – End of thread/transmittion (meaning: end of discussion) (mainly used in discussion groups and IRC)
ERC – Encrypted Relay Chat
ERR – Error
ERRPT – Error Report
EST – Enigma’s Setup Trojan (yet another lame Windows remote administration trojan, made by Enigma. Once you run the server file, anyone with the client program or a simple telnet application can access your computer. Basically it just opens a backdoor on your computer. The backdoor can be locked with a password so only the person who sent you the server file in the first place can access the backdoor. OK, unless the password gets hacked, of course. The only special thing about this trojan is that it is hidden within a “setup program”. Both the server and the client are to be executed from Windows 95/98)
ETLA – Extended three-letter acronym (that is, an FLA) (mainly used in IRC)
EULA – End User License Agreement
EWS – Excite for Web Servers
EXE – Executable (an executable file is a program that you can run and not only view like text files and pictures)
EXT – Extension / External
E-ZINE – Electronic Magazine (a magazine that is publised on the net instead of on paper)
F2F – Face to face (mainly used in IRC)
FACCI – Florida Association of Computer Crime Investigators
FAQ – Frequently Asked Questions
FAQE – Fake or unture FAQ
FAT – File Allocation Table (a small part in your HD that you cannot write to, which contains the location of every file/directory/sector in your HD and changes according to changes in your HD’s structure. For example: when you delete a file, write a new one, move a directory etc’ it changes the FAT according to the changes you’ve made)
FCP – [SCSI-3] Fibre Channel Protocol
FDD – Floppy Disk Drive
FDO – Form Display Operation
FIDT – Federal Intrusion Detection Network
FIFO – First In First Out
FIN – Finish (suppose you send someone some pieces of data using the TCP protocol. Once you’re done, your computer is supposed to send a TCP packet with the FIN flag on. Once the computer on the other end will receive it, it would know not to expect any more packets from you. This means that the sending process is complete and all of the packets will be forwarded to the application that has requested them in the first place (example: an Internet browser) or is supposed to receive them (example: an instant messenger program such as ICQ). More info at the entry TCP)
FingerD – Finger Daemon
FISH – First in, still here (mainly used in IRC)
FLA – Four-letter acronym (mainly used in IRC)
FMTYEWTK – Far more than you ever wanted to know (mainly used in IRC)
FOLDOC – Free On-line Dictionary of Computing (I quote: “FOLDOC is a searchable dictionary of acronyms, jargon, programming languages, tools, architecture, operating systems, networking, theory, conventions, standards, mathematics, telecoms, electronics, institutions, companies, projects, products, history, in fact anything to do with computing.”
FOMCL – Falling off my chair laughing (mainly used in IRC)
FORTRAN – FORmula TRanslation lANguage (a programming language)
FOTW – Fringe Of The Web (a website that lists the “top” 100 H/P/V/C/A sites. Mostly script-kiddies sites though)
FP – FrontPage (a lame website degisner by Micro$oft)
FPS – Frames Per Second
FPSE – FrontPage Server Extensions
FQDN – Fully Qualified Domain Name
FREE – the Forum for Responsible and Ethical Email
FS – File System
FTP – File Transfer Protocol
FTPD – FTP Daemon
FUBAR / FOOBAR – Fucked up beyond all repair or recognition (mainly used in IRC)
FUD – Fear, Uncertainty, and Doubt (mainly used in IRC)
FWIW – For What It’s Worth (mainly used in IRC)
FY – Fuck You (mainly used in IRC)
FYI – For your information (mainly used in IRC)
G / – Grin (mainly used in IRC)
GA – Go ahead (mainly used in IRC)
GAL – Get a life (mainly used in IRC)
GB – GigaByte (1,000 MBs)
GCC – Gnu C Compiler
GD&R – Grinning, ducking, and running (mainly used in IRC)
GDI – Graphical Device Interface
GFN – Good For Nothing
GFX – Graphics
GGREP – GNU GREP (GNU’s version of the popular Unix tool, GREP)
GH / gH – Global Hell (a hacking group. They’re in war with the FBI. Man, they’re really giving the feds a hard time. They DoSsed their servers and some other .gov servers a couple of times, ya know)
GIF – Grapics Interchange Format
GIMP – GNU Image Manipulation Program
GIS – Geographic Information Systems
GIWIST – Gee, I wish I’d said that (mainly used in IRC)
GL – Good Luck (mainly used in IRC)
GM – Game Master
GMTA – Great Minds Think Alike (mainly used in IRC)
GMV – Got My Vote (used a lot in online games such as Bezerk’s Acrophobia. See
GNOME – GNU Network Object Model Environment (a Window Manager for Linux)
GNU – GNU’s Not Unix (GNU is the largest open-source project, which was founded by Richard Stallman from MIT. Since Unix itself is copyrighted by AT&T, they called GNU that way. By the way, Linux is not copyrighted, and it is part of the GNU project as well. Anyway, open-source programming means free software that even comes with the source, so everyone will be able to improve it and fix security holes and suchlikes).
GOAT / GoA,T / GoAT – Go Away, Troll
GODMN – God Damn (mainly used in IRC)
GOL – Giggling out loud (mainly used in IRC)
GOV – Government (when referring to URL extensions)
GPF – General Protection Fault (kinda like a program crash)
GPL – General Public License (if a program is a GPL program, it means that everybody has the license to use and/or change the program, hence it is open-source)
GPP – [SCSI-3] Generic Packetized Protocol
GPS – Global Positioning System
GRAPHX – Graphics
GREP – Global find Regular Expression and Print (a famuos Unix utility, comes with all Unix variants. Basically it searches for a given string in a given file/files, but it can do a lot more than that)
GRL – Girl (mainly used in IRC)
GRRL – Girl (mainly used in IRC)
GSD – Get Service Dacl
GTG – Got to go / Gotta go
GTMHH / GT(M)HH / G2MHH / G2(M)HH – Guides To (Mostly) Harmless Hacking (a legal-hacking guide for complete newbies by Carolyn Mainel.
GTP / GTP? – Get The Picture? (mainly used in IRC)
GTRM – Going to read mail (mainly used in IRC)
GU – Glide Underground
GUI – Graphical User Interface (a GUI is like what Windows is to DOS or what X-Windows is to UNIX)
GUID – Global Unique ID
GW – Gateway (did you ever wonder how your ISP works? Well, you connect to your ISP by dialing to it, by connecting through some sort of a cable or by calling them on the phone and humming all those nifty modem sounds (not recommended) and they connect you to the internet through their connection to internet backbones. This is called a gateway. For those who remember the good old BBS days you might remember another type of gateway. Suppose you had a modem which was set to auto answer incoming calls. You could have programmed a gateway so whenever someone dials your number and your modem answers it will display a logo or give the person a menu etc’.)
HAFTA – Have To (mainly used in IRC)
HAO / HaO – Hackers Associated Online (taken from Title: Calling all K-RAD haxors. May 3, 1999, 23:26. Author: WHiTe VaMPiRe. Yes, you have waiting long and hard, that time spent will finally be paid off! Hackers Associated Online (HaO) is now accepting members!@!$ Pull out that dust covered winnuke, your copy of AOHell and UpYours; they will finally be put to use. Yes, you read correctly, HaO is accepting members. You will finally be just as er33rt and f33red as the true elites, move over I-L and #feed-the-goats, it is HaO; they take no prisoners! HaO was founded “to create a safe arena for information exchange”; only if you join and get access to their members’ section, that is. Quick! Send in your application now, because “Not everyone that applies will be accepted into the organization.” But beware, they have hard questions and high requirements if you wish to be a member of this motley crew. You have to answer such brain boggling questions, such as, “What is a BIOS?”, “Who wrotethe ‘Hacker’s Manifesto’?”, and “What command do you type to get a directory listing in Linux?” (I think they mean “folder”). Be a hax0r, be a man, and be part of HaO)
HARP – Hackers Against Racist Parties
HB – HyperBanner (kinda like LE. Has it’s own advantages and disadvantages)
HBA – Host Bus Adapter
HC – Hackcity (4/5s of script-kiddizm but a nice 1/5 of hacking. Oh, yeah, and they claim to have “ethics”. If you have ethics why do you offer your visitors nukes and trojans? “For educational purposes”? Yeah, right… most of the staff are real lamers (especially Hadez). The rest are semi-lame… hehe…
HCL – Hardware Compatibility List
HD – HardDisk / HardDrive. Can also mean High Density, if refering to a floppy disk. Other XD terms include: DD – Double Density, SD – Single Density.
HDC – (a cool website for hackers. Has all sorts of interesting features and rare files
HDD – HardDisk Drive
HDSL – High BIT-rate Digital Subscriber Line (see DSL)
HELLUVA – Hell-Of-A… (mainly used in IRC)
HERF – High Energy Radio Frequency
HFC – HellFire Club (a hacking group)
HGL – Hewlett packard Graphics Language
HH – Happy Hacker (a website, a mailing list and a hackers wargame for newbies. A great place to start IMHO. / Hackersclub (a cool BBS-like website with a good library.
HINFO – Hardware/software INFOrmation
HIR – Hacker Information Report (yet another E-zine. Rather interesting, though.
HIU – Hack It Up (a hacking website/group.
HL – Half Life (the best first person shooter game in the world in R a v e N and F a n g’s opinion)
HLS – Hue Lightness Saturation
HLT – Halt (all modern CPUs have an HLT option. This means your CPU turns itself off for milliseconds or more, depending on several factor, to cool itself down. Unfortunately, Windows 95 nor 98 don’t support this option so you have to download a program called CPUIdle from More info in CPUIdle’s readme files)
HNC – (a hacking group. They also give away free webspace for hacking-related sites (but no porn/warez crap).
HNN – Hacker News Network
HOMER – Heuristic Overview of Matrix Expansion and Reconstruction (a story-telling AI from the wonderful 80s computer game “Portal”. Quote: “…I come from times of acronyms…”)
HOPE – Hackers On Planet Earth
HP – Hewlett Packard (American/English Manufacturer of good Computers/the best printers) / #Hackphreak (a lame undernet channel full of lame script kiddies)
HPFA – High Performance System (OS/2)
HPVCA / H/P/V/C/A – Hacking/Phreaking/Virii/Carding/Anarchy
Hr / HR – hour
HRZ – Horizontal
HSB – Hue Saturation Brightness
HSV – Hue Saturation Value
HTH – Happy To Help / Hope This/That helped (mainly used in IRC)
HTML – Hyper Text Markup Language
HTP – Hack The Planet (some hacking group.
HTTP – Hyper Text Transfer Protocol
HU – Hacker’s Utility (a famous hacking utility)
HVD – High Voltage Differential
Hz / HZ – Hertz
IAC – In any case (mainly used in IRC)
IACR – International Association for Cryptographic Research
IAE – In Any Event
IAL – Internet Address List
IANAL – I Am Not A Lawyer (but) (mainly used in IRC)
IBM – International Business Machines (a famous computers company. There’s no way you havn’t heard of it) / I Blame Microsoft ;)
IBPAG2 – Icon-Based Parser Generation System 2
IC – In Character (used mainly in MUDs)
IC / I C – I see (mainly used in IRC)
ICANN – Internet Corporation for Assigned Names and Numbers (a non-profit corporation formed by the global Internet community to assume responbisility for certain Internet domain name system fuctions, as set forth in the U.S. Government’s Statement of Policy (‘White Paper’))
iCE / ICE – Insane Creators Enterprise (a lame hacking group)
ICMB – ICMP Bombing (a DoS attack)
ICMP – Internet Control Message Protocol (it is used to relay network conditions and different errors to IP (Internet Protocol) and other layers)
ICMPHU – ICMP Host Unreachable (a DoS attack)
ICO – Icon (a small picture that is used to recognize a file. For example: text files will probably have an icon of a note, images will probably have the icon of a picture, games will probably have their logo as their icon etc’)
ICP – Internet Caching Protocol
ICQ – I Seek You (not exactly an acronym, but…)
ICQPC – ICQ Password Cracker (a program by Progenic Warfare ( that cracks locally-stores ICQ passwords)
ICSD – Information and Computing Sciences Division
ID – Identification
IDC – Internet Database Connector
IDDN – International Digitan Defense Network
IDE – Integrated Drive Electronics (an interface for disk drives)
IDENT – Identity (not to be confused with the Ident daemon or the INetD program)
IDS – Intrusion Detection System
IE – Internet Explorer (Micro$oft’s web browser. A good competitor for Netscape but has plenty more bugs in it than netscape)
IEEE – Institute of Electrical and Electronics Engineers
IETF – Internet Engineering Task Force (a bunch of guys who make up all sorts of Internet standards and suchlikes)
IFS – Input Field Seperator
IGMP – Internet Group Multicast Protocol
IHA – I hate acronyms (mainly used in IRC)
IHN – Internet Host Network (they give away free V3 domains, free web space and much much more.
IHU – ICQ Hacking Utilities (a famous and currently-offline website. I wouldn’t call ICQ Utilities hacking, though)
IIRC – If I recall/remember/recollect correctly (mainly used in IRC)
IIS – Internet Information Server (a webserver. If you have a fast connection to the internet and a fast and reliable computer with plenty of RAM you can install this program and you’ll have a webserver on your PC. There are several different programs of this type, some are better, some are worse)
IIX – Israeli Internet Exchange
IL / I-L – Iron Lungs (a member of HcV)
ILF – Independent Logical File
ILU or ILY – I love you (mainly used in IRC)
IM – Immediate message (mainly used in IRC)
IMAP – Interactive Mail Access Protocol (a protocol used for transferring Emails)
IMDB – Internet Movie DataBase (know the URL? Mail us at
IMHO – In my humble opinion (mainly used in IRC)
IMing – Chatting with someone online usually while doing other things such as playing trivia or other interactive game (mainly used in IRC)
IMNSHO – In my not so humble opinion (mainly used in IRC)
IMO – In My Opinion
IMP – Interface Message Processor (the Internet’s (ARPANet at that time) first router)
iNC / INC – International Network of Crackers (a hacking group)
INDY – Indigo
INet – Internet
INetD – Internet Daemon (there’s also a UNIX program called inetd that is in charge of taking care of all the daemons and everything related to such tasks)
INSI – International Network Security Inc. (a security-consulting company based in Japan)
INST – Install / Installation
INT – International (a URL extension. For example:
IO / I/O – Input/Output
IOL – Israel OnLine (yes, I am from Israel and I’m proud, dammit! lol.
IOW – In other words (mainly used in IRC)
IP – Internet Protocol (the connectionless, unreliable network protocol in the TCP/IP suite. It has two 32-bit header fields to hold address information. IP is also the busiest of all the TCP/IP protocols as almost all TCP/IP traffic is encapsulated in IP datagrams. IP’s job is to route packets around the network. It provides no mechanism for reliability or accountability, for that, it relies on the upper layers. IP simply sends out datagrams and hopes they make it intact. If they don’t, IP can try to send an ICMP error message back to the source, however this packet can get lost as well. IP has no means to guarantee delivery. Since IP is connectionless, it does not maintain any connection state information. Each IP datagram is sent out without regard to the last one or the next one. This, along with the fact that it is trivial to modify the IP stack to allow an arbitarily chosen IP address in the source (and destination) fields make IP easily subvertible)
IPAC – IP Accounting (an IP accounting package for Linux. It collects, summarizes and nicely displays IP accounting data. The output of IPAC can be a simple ASCII table, an ASCII graph or even GIF images with graphs showing traffic progression. IPAC can be used for IP traffic analysis and for accounting purposes. Runs on top of the ipfwadm or ipchains tool)
IPFM – IP Flow Meter (a bandwidth analysis tool that counts how the number of bytes each host on specified subnest each host on specified subnest transfers to internet gateways. It outputs a list of these hosts and their transfer amounts at specified delays. IPFM uses libpcap and aims to be portable. IPFM was programmed by Robert Cheramy & Andres Krapf)
IPN – I’m posting naked (mainly used in IRC)
IPP – Internet Printer Protocol
IPPL – IP Protocol Logger (logs tons of incoming and outgoing traffic)
IRC – Internet Relay Chat
IRL – In real life (that is, when not chatting) (mainly used in IRC)
IRQ – Interrupt Request
IRS / IRSN – Initial Receive Sequence Number (the IRSN is learned during the 3-Way TCP handshake. See ISN)
ISDN – Integrated Services Digital Network (a type of phone line which faster than most regular phone lines. Supports multi-usage, which means you can use your modem and your phone on the same line simultaneously, each getting 6.4KPS)
ISN – Initial Sequence Number (usually 1. See TCP)
ISO – Organization for International Standards / International Standardization Organization
ISP – Internet Service Provider
ISS – Internet Security Systems (an Atlanta-based security-auditing firm) / Internet Security Scanner (a network scanner that searches for possible security holes)
ISS / ISSN – Initial Sent Sequence Number (another name for the ISN. That’s how TCP calls it: tcp_iss)
ITAA – Information Technology Association of America
ITS – Intelligent Transportation System
IUCC – Israel Inter-University Computation Center
IYSWIM – If you see what I mean (mainly used in IRC)
JBOD – Just a bunch of disks (like RAID, etc.) (mainly used in IRC)
JDO – Jewish Defense Organization (
JIC – Just in case (mainly used in IRC)
JK / J/K – Just kidding (mainly used in IRC)
JOOTT – Just One Of Those Things
JP – John Vranesevich (the founder of Read about why he’s a racist media whore and all sorts of bad things at in the “High Slanders” section)
JPEG – Joint Photo Experts Group
JTF CND / JTF-CND / JTFCND – Joint Task Force for Computer Network Defense
JTR / JtR – John the Ripper (a Unix password cracker)
JV / JVIEW / JView – Java Viewer
JVM – Java Virtual Machine (a program that let’s you run Java applications from a non-java OS)
K – OK / Thousand
KB – Kilobyte
KC – Kilo Cycle
KDE – Kewl Desktop Environment (a Window Manager for X11 (XWindows))
KHG – Kosovo Hackers Group
KIAM – Keldysh Institute of Applied Mathematics (The famous Russian Institute)
KISS – Keep It Simple Stupid
KLOG – Kernel Logger (see KLOGD)
KLOGD – Kernel Logger Daemon (a program that comes with every Unix distribution AFAIK and logs Kernel-related events)
KOD – Kiss Of Death
KOTM – Kook Of The Month
KPS / KBSP – KBs per second (the amount of KBs that are transferred per second on the current connection speed)
KSH – Korn Shell (a Unix shell. Usually located at /bin/ksh)
KVT – KDE Virtual Terminal
KWIM? – Know what I mean? (mainly used in IRC)
L8LY – Lately (mainly used in IRC)
L8R – Later (mainly used in IRC)
LAD – Login Anomaly Detection
LAN – Local Area Network
LART – Looser Attitude Readjustment Tool (baseball bats are popular)
LASG – Linux Administrators Security Guide (
LBA – Logical Block Address
LBNL – Lawrence Berkeley National Laboratory
LC – Logical Coordinates
LCD – Liquid Crystal Display
LD – Later, dude (mainly used in IRC) / Link Dead / Long Distance
LDAP – Lightweight Directory Access Protocol
LDR – Long-distance relationship (mainly used in IRC)
LE – Link Exchange (a banner-exchange network plus tons of cool services for webmasters.
LED – Light Emitting Diode
LEET / L33T – Elite (a language mainly used by hackers on IRC, when 3 is e, 4 is a, 8 is ate (for example: m8=mate, l8r=later), 1 is l, 5 is s, 7 is t and 0 is o. Hackers mainly use l33t on IRC just for “phun”, but if you catch someone using l33t a bit 2much he’s probably just another hacker-wannabe)
LF – Line Feed (a system character used by DOS, UNIX and DOS/UNIX-based OSs (Winblows=DOS-based, Linux(any distribution)=UNIX-based). It is a special ASCII character called Line Feed that means “end of line” in text files. While in UNIX-based OSs the end of a line is marked only by an LF, DOS-based OSs use a CR (Carriage Return) character and then an LF)
LFN – Long File Name
LILO – LInux LOader
LIS10 – Listen (mainly used in IRC)
LKM / LLKM – Loadable Linux Kernel Modules
LL – Link Looker (a program that detects server splits on IRC)
LLTA – Lots and lots of thunderous applause (mainly used in IRC)
LMOS – Loop Maintenance Operations System
LN – Link
LNK – Link
LOD / LoD – Legion Of Doom (a hacking group)
LOGIN – Log In (whenever you telnet into a system it asks you to login and asks you for a login and a password. A login is like a username, but there is more than that. Logging means keeping track of everything that happens in a given place. When you log in, the system logs your every move, even if you type in a bad password and never get a command prompt at all. For more info, type man login on a UNIX system)
LOL – Laughing Out Loud / Lots of Laughs / Lots Of Lag
LOTR / LotR – Lord of the Rings
LOU / LoU – Legions Of the Underground (a hacking group)
LP – Line Printer
LPH – Local Password Hacker (a program that hacks locally-saved passwords such as screen saver passwords, passwords for protected areas etc’)
LPI – Lines Per Inch (kinda like DPI, only it’s a different scale)
LRF – Little Rubber Feet (the little pads on the bottom of displays and other (mainly used in IRC)equipment)
LS – List (a Unix command which lists the contents of a directory but can do a lot more than that. For more info type man ls)
LSA – Local Security Authority (this is also known as the Security Subsystem. It is the central component of NT security. It handles local security policy and user authentication. LSA also handles generating and logging audit messages. Quoted from the Hack Faq)
LSCP – LiteStep Control Panel
LSL – Linux System Labs
LTM – Laugh to myself (mainly used in IRC)
LUG – Linux User Group
LUN – Logical Unit Number
lUSt / LUST – Linux Users Strike Today (a hacking group)
LVD – Low Voltage Differential
M0D – Masters Of Downloading (a hacking group. They cracked several .gov websites, including
M8 – Mate (mainly used in IRC)
M8Y / M8EY – Matey (mainly used in IRC)
MAC – Media Access Control / Medium Access Control / Macintosh (a cool PC by Apple. The only problem with it is that it has about 100 times less programs than Windows has. Even though you can always run ‘virtual machines’ (emulators) on your Mac and therefore be able to run Windows from it, common belief is that Macs are dangerous since you could get stuck with a crapload of non-compatible software)
MAN – Metropolitan Area Network / Manual (a very useful Unix command. Type ‘man command’ (without the quotes) and you will get the “man pages” (a manual) for this command)
MAPS – Mail Abuse Prevention System
MB – MegaByte (1,024K) / Message Board
MBM – MotherBoard Monitor
MBR – Master Boot Record
MCB – Multi Collide Bot
MCGA – Multi Color Graphics Array (kinda like VGA)
MCP – Microsoft Certified Professional
MD – Message Digest
MDI – Multiple Document Interface
MEM – Memory
MEMS – Micro Electro Mechanical System (devices invented by Sandia National Laboratory. It’s a tiny lock, so tiny that it can fit on a chip, and it’s gears can only be seen by microscopes. It physically prevents access from devices and you only have one try to guess the code before the system shuts itself down. Sandia National Laboratory claims they can build a hacker-proof computer with this little baby. More info at
MESH – Macintosh Enhanced SCSI Hardware
MFC – Microsoft Foundation Class (a bunch of basic files for Visual Basic/Visual C++ applications)
MFI / MOI – Missing From/On IRC (mainly used in IRC)
MGA – Masquerading Gateway Administrator (it’s a little script for UNIX for managing your masquerading gateway so you don’t have to fiddle with ipchains/ifconfig/redir all the time. You can manage port redirections, ip alliases and entires in the ipchains forward chain)
MHOA – Microsoft Haters Of America (
MICRO – Microsoft
MICROSOFT – Most Intelligent Costumers Realize Our Software Only Fools Teenagers ;)
MID/MIDI – Musical Instrument Digital Interface (a .mid file contains orders for the sound device to create notes. The music is devided into tracks where each track can have the soun of a different musical instrument, and all of the channels are played together. This way you can make channel one play the bass line as a bass guitar, channel two to be an organ, channel three to be an electric guitar, thus making your own music note by note, command by command. General MIDI files contain up to 10 tracks, extended MIDI files up to 16 tracks. Channel 10 is the standard for the beat (drums) channel. The result depends on your sound device. Sound Blaster 16, for example, would produce sounds similar to a PC BEEP (lol) for all instruments, while SOund Blaster AWE64 uses sound samples and the music it produces sounds very realistic. There are also applications that come with their own sound samples. MIDI files can also contain lyrics for programs that can show them, so you could host your own kareoke party!)
MIL – Military (a URL extension. For example:
MIME – Multipurpose Internet Mail Extensions (a protocol that is used to view Email)
Min – minute
MINUET – Minnesota Internet Users Essential Tool
MIPS – Meaningless Indication of Processor Speed ;)
MKS – Mortice Kern Systems
ML – Mailing List
MLIST – Mailing List
MLT – Mechanized Loop Testing
MMX – MultiMedia eXtensions
MNS – Multifunctional Network Scanner
MOD – Magneto Optical Disk / Moderator / Masters Of Downloading (a hacking group. They cracked several .gov websites, including
MoD – The British Ministry of Defence
MODEM – MOdulator/DEModulator (modulating – the act of turning bits into analogic signals which can be transferred through phone systems. Demodulating: the opposite of modulating)
MON – Monitor
MorF – Male or female (mainly used in IRC)
MOSS – Member of the same sex (mainly used in IRC)
MOTD – Message Of The Day (mainly used in IRC)
MOTM – Message Of The Month (mainly used in IRC)
MOTOS – Member Of The Opposite Sex (mainly used in IRC)
MOV – Movie / a great computer video format by Apple
MP3 – MPEG 3-Layer (the best music format that has both quality and a small size (1 minute = ~1MB in CD quality). You can download many MP3s from all sorts of places on the net, but instead of searching for the keyword MP3 or your favorite song/artist and finding trillions of sites with dead links or tons of commercials just go to The layout is okay but I find it rather reliable and easy-to-navigate. I often find tons of rare MP3s there that don’t seem to show up in other websites)
MPEG – Motion Picture Experts Group (a superb computer video format)
MPSRT – Microsoft Product Security Response Team
MRTG – Multi Router Traffic Grapher
MS – Microsoft (or more to say, Micro$oft)
MSDN – Microsoft Developer’s Network
MSDOS / MS-DOS / MS DOS – Microsoft Disk Operating System (Microsoft’s version of the DOS OS)
MSG – Message
MSIE – Micro$oft Internet Explorer (often called ExPlonter, Exploiter etc’)
MSN – Microsoft Network (enough said…
MSP – Micro$oft Paint
MSS – Maximum Segment Size (the value of your MTU minus 40)
MTD – Memory technology Driver
MTU – Maximum Transfer Unit (max size of packets)
MUD – Multi User Dimension (kinda like a D&D/AD&D game on the internet)
MUL – Multiply
MX – Mail eXchanger
N – And
N E 1 / NE1 – Anyone (mainly used in IRC)
NA – Network Associates
NA or N/A – Not Available
NAI – Network Associates
NAK – Negative Acknowledgment (ASCII char number 21 that is transmitted to the sending unit by the receiving unit and means that the wrong signal has been sent)
NAP – Network Access Point
NASSCOM – National Association of Software and Service Companies
NAT – Network Address Translation
NB – Netbus (one of the most famous Windows remote administration trojans, made by CF. Once you run the server file, anyone with the client program or a simple telnet application can access your computer. Basically it opens a backdoor on your computer. The default port for the backdoor is 12345 but it can be changed for numerous reasons. The backdoor can be locked with a password so only the person who sent you the server file in the first place can access the backdoor. OK, unless the password gets mysteriously hacked… both the server and the client are to be executed on Windows only)
NBP – Name Binding Protocol
NC – Network Computer
NC – Norton Commander
NCIC – National Crime Information Center
NCP – Network Control Protocol
NCSA – National Center for Supercomputing Applications
NCSC – National Computer Security Center
NDIS – Network Driver Interface Specification
NDS – Novell Directory Services
NET – Network
NetBEUI – NetBIOS Extended User Interface
NetBIOS – Network Basic Input/Output System
NETHOOD – “Network Neighborhood”
NEXT – Near-End Crosstalk
NFC – No Further Comment / No Fucking Comment
NFR – Network Flight Recorder (kinda like a network activity logger)
NFS – Network File System (a system that is used for files over a network… LOL)
NFW – No feasible way / no fucking way (mainly used in IRC)
NFW – No Fuckin’ Way (mainly used in IRC)
NGREP – Network GREP (a pcap-aware tool that will allow you to specify extended regular expressions to match against the data payloads of packets, and currently recognizes TCP and UDP, and works on Ethernet, PPP and SLIP interfaces. Excellent tool)
NI2 – Net Indexer 2
NIC – Network Interface Card / Network Information Center
NIDS – Network Intrusion Detection System
NIPR – Non-classified Internet Protocol Router
NIPS – National Infrastructure Protection Center (kinda like CERT only they’re still online and they aren’t being so late with their advisories)
NIS – Network Information System
NIST – National Institute of Standards and Technology
NIT – Network Interface Tap
NM / N/M – Never Mind (mainly used in IRC)
NME – Enemy (mainly used in multiplayer games)
NMO – New Millenium Organization (a lame “hacking” group. Netbus…
NMRC – Nomad Mobile Research Center (a security group.
NNTP – Network News Transfer Protocol
NOC – Network Operations Center / No See (as in “Sup m8! Long tyme noC.”)
noC / NoC – See NOC
NOP – No Operation
NOS – Network Operating System
NP / N/P – No Problem
NPA – Numbering Plan Area
NPS – Nevermind (mainly used in IRC)
NRG – Network Research Group
NRN – No Response/Reply Necessary (mainly used in IRC)
NS – Netscape / Name Server / Network Solutions (the only company which provides top-level domain names. Other companies simply go there and do the dirty job for you.
NSA – Name Service Architecture
NSI – Network Solutions (see NS)
NSS – Novell Storage Services / Network Security Scanner (a network scanner that searches for possible security holes.
NSW – Network Security Wizards (
NT – Network / Windows NT (Windows for networks)
NTA – The Nocturnal Trading Alliance (a hacking group)
NTDS – Naval Tactical Data System
NTFS – NT File System (NT=Windows NT)
NUMA – Non-Uniform Memory Access
NURMS – Non Uniformally Rational Mesh Smooth
NVLAP – National Voluntary Laboratory Accrediation Program
NVRAM – Nonvolatile RAM
O/S – Operating System
OCC – Occupied
OCR – Optical Character Recognition
OCX – OLE Custom Control
ODBC – Open Database Connectivity
ODI – Open Data-Link Interface
ODL – Object Description/Definition/Design Language
ODL – Open and Distance Learning
ODMA – Open Document Management API
OEM – Original Equipment Manufacturer
OF / O/F – Offline
OFCS – Oh, For Christ’s Sake (mainly used in IRC)
OHG – Oh, Gotcha! (mainly used in IRC)
OHWELL – Oh Well (see OWELL)
OIC – Oh, I see (mainly used in IRC)
OL / O/L – Online
OLAP – Online Analytical Processing
OLC – OnLine Creation
OLE – Object Linking and Embedding
OLL – Online love (mainly used in IRC)
OLTP – Online Transaction Processing
OMG – Object Management Group / Oh My God (mainly used in IRC)
OO – Object-Oriented
OOB – Out Of Band
OOC – Out of Character (used mainly in MUDs)
OOP – Object Oriented Programming (too complicated to explain here. Go read a book)
OPAC – Online Public Access Catalog
OpenGL – Open Graphics Library
OPENSEC / OpenSEC – Open Security Solutions (a mailing list dedicated to announcing the latest versions of free and Open Source security tools. For more information, go to
ORB – Object Request Broker
ORBS – Open Relay B System (“The short answer: ORBS is a database of open mail relays, accessible via DNS lookup.” Not the whole truth, but a good first approximation.
OS – Open Source / Operating System
OS/2 – Obsolete Soon, Too ;)
OSDN – Open Source Developers Nerwork (
OSF – Open Software Foundation
OSG – Open Service Gateway Initiative
OSH – Operatr SHell
OSI – Open Systems Interconnection
OSP – Online Service Provider
OSPF – Open Shortest Path First
OTB – Only The Best (a chat acronym / an extremely lame hacking-related website. They claim their site is not meant for people who want to harm other people. Oh, yeah? Then why do you feature lame nukes and icq programs? “For educational purposes”? Yeah, right…
OTF – Off The Floor (mainly used in IRC)
OTOH – On The Other Hand (mainly used in IRC)
OTP – One-Time Pass (a program that provides unrestricted one-time pass codes on a user by user basis without any need for cryptographic protocols or hardware devices. The user takes a list of usable pass codes and scratches out each one as it is used. The system tracks usage, removing each passcode from the available list when it is used. Comes with a very small and fast password tester and password and pass phrase generation systems. Excellent against network sniffers and keyloggers)
OTTOMH – Off the top of my head (mainly used in IRC)
OWELL – Oh Well (mainly used in IRC)
OWN / 0WN – “owned” or “hacked” (mainly used in IRC)
OWNED / 0WNED – “owned” or “hacked” (see 0WN)
PANS – Pretty awesome new stuff (as opposed to “POTS”) (mainly used in IRC)
PANW – Parents Are Not Watching
PAP – Password Authentication Protocol
PARC – Palo-Alto Research Centre (a Computer research park owned by Xerox)
PASSWD – Password
PAW – Parents Are Watching (mainly used in IRC)
PBF – Policy-Based Filtering
PBM – Portable Bitmap / Play By Mail (an old type of networked multiplayer games. You send a series of commands over an Email network and you wait for a reply mail. Boring…)
PBX – Private Branch eXchange
PC – Personal Computer
PCDOS / PC-DOS / PC DOS (IBM’s identical version for MS-DOS)
PCI – Peripheral Component Interconnect
PCKT – Packet
PCKTS – Packets
PCMCIA – People Can’t Master Computer Industry Acronyms (mainly used in IRC) / Personal Computer Memory Card International Association (know these slots behind your computer? Well laptops have the same slots only they’re a bit different and they’re called PCMCIA slots)
PDA – Public display of affection (mainly used in IRC) / Personal Digital Assistant (your little compy friend who will help you organize your messy schedule, phone numbers, cooking receipts etc’)
PDC – Primary Domain Controller
PDL – Page Description Language
PDX – Paradox (a hacking group)
PE – Public Enemy (a hacking group) / Pirated Education (a hacking group)
PEBCAK – Problem exists between chair and keyboard (mainly used in IRC)
PECSENC – The President’s Export Council Subcommittee on Encryption
PEGS – PErl Graphical Structures
PENTIUM – Produces Erroneous Numbers Through Incorrect Understanding of Mathematics ;)
PERL – Protocal Extraction and Report Lang / Practical Extraction and Report Language (an interpreted programming language)
PERM – Permission
PGF – Portable Graphics format
PGM – Portable Greymap
PGP – Pretty Good Privacy (an encryption method)
PHACV / P/H/A/C/V – Phreaking, Hacking, Anarchy, Cracking, Virii (see HPVCA)
PHF – Phreaking Hacking Force (
PHG – Pakistan Hacking Group
PHP – PHP: Hypertext Preprocessor (
PIBKAC – Problem is between keyboard and chair (mainly used in IRC)
PICS – Parental Internet Content SelectionR
PID – Process ID (every process (running program) on Unix has a PID. To view running processes and their PIDs type ps. If you know the PID of a process you can also kill it (stop the process immedietly) by typing kill PID and replacing PID with the process ID)
PIF – Program Information File
PIKT – Problem Informat / Killer Tool (PIKT is a multifunctional tool for administering networked workstations. It features an embedded scripting language and a powerful script processor for generating the reports you need over the network. PIKT’s primary purpose is to monitor systems, report problems, and fix those problems when possible.
PIN – Personal Identification Number
PINE – Pine Is No longer Elm (Pine is today’s Email client of choice on text-based UNIX shells (remote or local). Pine is also an acronym, which stands for Pine Is No longer Elm. Elm was an older UNIX Email client which was later replaced with Pine. Both Pine and Elm were in use since the old days of ARPANet, the US Defense Advanced Research Projectgs Agency computer network that eventually mutated into today’s Internet once it became open for the masses in the early 90s)
PING – Packet INternet Groper (everything sent to the ping port will be echoed back. This is good for finding out of the target host is alive (conencted). The actual verb (to ping) means to send something to the echo port)
PIO / PI/O / P I/O – Programmed I/O
PIP – Picture Inside Picture
PITA – Pain in the ass (mainly used in IRC)
PL – Perl
PLZ – Please (mainly used in IRC)
PMFJIB – Pardon me for jumping in but… (mainly used in IRC)
PMT – Progenic Mail Trojan (a program by Progenic Warfare ( that is actually a trojan that, once run, finds all the passwords on your computer and then mails them to the guy who sent the trojan to you)
PMTU – Path Maximum Transfer Unit
PNG – Portable Network Graphic
PNP – Plug aNd Play (this neat little feature that autodetects new hardware and hardly works. Well, at least on Windows…)
POC / PoC – Proof Of Concept (a security group.
POD – Portal Of Doom (Hackcity’s lame Windows remote administration trojan. Once you run the server file, anyone with the client program or a simple telnet application can have full control over your computer. The server file can be hidden inside programs or games. Basically it opens a backdoor on your computer. The backdoor can be locked with a password so only the person who sent you the server file in the first place can access the backdoor. Well, unless the password gets hacked, of course. Both the server and the client are to be executed from Windows 95/98.
POP – Post Office Protocol (If you’ve got a mail account on your ISP it’s probably a POP3 account) / Pentagram Of Protectors (a power-up in the famous first person shooter game Quake. Gives you protection for some time)
POSIX – Portable Operating System Interface based on uniX (a collections of standards for UNIX OSs)
POST – Power On Self Test
POT – Plain Old Telephone / Ping Observation Tool (a highspeed tool to sweep for smurf broadcast amplifiers, it compiles a broadcast amplifier list of the complete IPv4 address range in about 5 days (with enough bandwidth). (this was a review from Packet Storm Security (
POTS – Plain old telephone service (mainly used in IRC)
PPL – People (mainly used in IRC)
PPM – Portable PixelMap
PPP – Point to Point Protocol (when you connect to your ISP you get a PPP connection that allows you to view pretty pictures and animations and sounds during your internet stay. Other protocols such as the telnet protocol only transfer text)
PPS – Packets Per Second
PPTP – Point-to-Point Tunneling Protocol
PREFS – Preferences
PROC – Process
PROG – Program
PROGMAN – Program Manager (the interface used by Windows 3.11. You can still use it from Windows 95 and 98 by simply typing program at the run dialog box or going to Windows’ directory and executing progman.exe)
PROLLY – Probably (mainly used in chatrooms)
PS – Post Script / Packet Storm (an excellent securtiy-related website.
PSH – Push (a TCP flag. More info at the entry TCP)
PSN – Packet Switching Network
PSS – Packet Storm Security (an excellent security-related website.
PSTN – Public Switched Telephone Network
PSY – Psychose (a hacking group)
PU – That stinks! (mainly used in IRC)
PUTER – Computer
PWD – Print Working Directory (a Unix command. Prints the name of the current directory (the directory you’re in now) and it’s full path to the screen. For example: if you type pwd and it returns /usr/root it means you’re in /usr/root. Hey! You’d better not be really getting root! Stay away from my box, you pervert! lol. For more info type man pwd)
PWL – Password List
PWS – Personal Web Server (a lame Windows webserver by Microsoft)
QBasic – Quick Basic (if BASIC is your language than QBASIC is your interpeter. Well, at least one of the interpeters available)
QHA – Quebec Hackers’ Alliance (a hacking group.
QTX – Quartex (a hacking group)
R – Read / Repeat / Recursive
RAID – Redundant Array of Inexpensive Disks (a system that includes many HDs or other forms of data storage)
RAM – Random Access Memory
RAS – Remote Access Server
RASMAN – Remote Access Connection Manager
RAT – Remote Access Trojan (a program that when run opens a port on your computer and acts as a daemon. Everyone running the appropriate client (or everyone who knows raw commands for this specific RAT) can get some sort of access to your computer, depending on how sophisticated the RAT is)
RAW – Remote Administration Window (yet another lame Windows remote administration trojan. Once you run the server file it opens a backdoor on your computer and anyone with the client program or a simple telnet application can access your computer. The backdoor can be locked with a password so only the person who sent you the server file in the first place can access the backdoor. OK, unless the password gets mysteriously hacked… both the server and the client are to be executed from Windows 95/98)
RBL – Realtime Blackhole List
RBOC – Regional Bell Operating Company
RC – Reconfigure
RCS – Revision Control System
RCW – Receive Window
RDM – Relational Data Model
RECV – Receive
REG – Registry
REGEXP – Regular Expression (a powerful type of wildcard pattern. Used for pattern matching in programs such as the Unix program grep)
REM – Remember
RES – Resolution
REXD – Remote Execution Daemon
RFC – Remote Function Call / Request For Comment (papers by the IETF that contain suggestions for Internet standards. RFCs are great places to learn from. I usually look up RFCs at
RFC – Request For Comment (used mainly in usenet newsgroups)
RFTRFC – Read the fine/fucking RFC (mainly used in IRC)
RGB – Red Green Blue
RH – RedHat (a UNIX variant.
RIA – Rebels of the Information Age (
RIP – Routing Information Protocol
RISC – Reduced Instruction Set Computer (As in RISC OS, the OS run by Acorns)
RK – Root Kit
RL – Real life (that is, when not chatting) (mainly used in IRC)
RLOGIN – Remote Login (if you are using UNIX and you have a file called .rhosts on your home directory then anyone listed there can type rlogin your-login-name from his machine and he will be able to login as you without a password. For more info, type man rlogin)
RM – Relational Model / Research Machine (some lame and insecure network. Read the RM Networks tutorial by Njan in the tutorials page at / Remove (RM can be either used as an abbreviation for remove but is also the Unix command that deletes files. For more info look up the entry MAN in this file and use it) / Research Machines (Don’t buy one, whatever you do. Get a Dell, even a Tiny (but shudder at the thought of a Tiny), but NOT an RM)
RN / REN – Rename
ROF – Rate Of Fire
ROFL / ROTFL – Rolling On (The) Floor Laughing
ROFLMAO / ROTFLMAO – Rolling On (The) Floor Laughing My Ass Out
ROFLMAOWPIMP – ROFLMAO While Peeing In My Pants (mainly used in IRC)
ROFLMBO / ROTFMBO – Rolling On (The) Floor Laughing My Butt Out (mainly used in IRC)
ROFLMBOWPIMP / ROTFMBWPIMP – ROFLMBO While Peeing In My Pants (mainly used in IRC)
ROFLWPIMP / ROFTLWPIMP – ROFL While Peeing In My Pants (mainly used in IRC)
ROM – Read Only Memory
ROR – Raffing out roud (English for “laughing out loud”) (mainly used in IRC)
ROT – Rate Of Turn
ROTFL – Rolling on the floor laughing (mainly used in IRC)
ROTFLMAO – Rolling on the floor laughing my ass off (mainly used in IRC)
ROTFLMAOWPIMP – Rolling On (The) Floor Laughing My Ass Out While Peeing In My Pants (mainly used in IRC)
RP – Responsible Person (the person who is responsible for a specific domain)
RPC – Remote Procedure Call
RPG – Role-playing Game
RPH / RPHH – Royal Phreakers HouseHold (a lame hacking/phreaking/virii group. Just another bunch of script kiddies. Oh yeah, and they have a newsletter which seems to have a tendancy to come out 6 months late.
RR – Resource Record
RRS – Remote Registry Sharing
RSB – Repair Service Bureau
RSH – Restricted bourne SHell
RSN – Real Soon Now (mainly used in IRC)
RST – Reset (see ACK) / Reliable Software Technologies
RT – Route
RTC – Remote Target Control / Real Time Clock
RTF – Rich Text Format
RTFF – Read the fine/f***ing f***
RTFM – Read the fine/fucking manual (mainly used in IRC)
RTMP – Routing Table Maintance Protocol
RTS – Real-Time Strategy
RTT – Round Trip Time (the time it takes to receive some sort of a reply from the receipt, or in other words the time it takes for you to send a packet to someone and to that someone to send a packet back to you)
RWIN – Receive Window
RYO – Roll your own (write your own program; derived from cigarettes rolled yourself with tobacco and paper) (mainly used in IRC)
RZR – Razor (1911) (a hacking group)
S!P / SIP – Surpr!se Productions (a hacking group)
S/MIME – Secure / MIME (an encryption standard)
SAA – System Application Architecture
SAFTE – SCSI Accessed Fault-Tolerant Enclose
SAGE – SYstems Advisory Group Enterprises
SAINT – Security Administrator’s Integrated Network Tool (gathers information about remote systems and examines possible security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces))
SAM – SCSI-3 Architecture Model / Security Account Manager (a component in NT’s security. SAM handles user and group accounts, and provides user authentication for LSA. Quoted from the Hack Faq)
SARA – the Security Auditor’s Research Assistant ((as described by Packet Storm Security) a third generation security analysis tool that is based on the SATAN model, conforms to the Open Source model, is covered by the GNU open license, fosters a collaborative environment, and is updated on a weekly basis. Advanced Research’s philosophy relies heavily on software re-use. Rather than inventing a new module, SARA is adapted to interface to other community products. For instance, SARA interfaces with the popular NMAP package for superior “Operating System fingerprinting”. Also, SARA provides a transparent interface to SAMBA for SMB security analysis. SARA’s features include: Built-in report writer (by subnet or by database), Built-in summary table generator, Gateway to external programs (e.g., NMAP), CGI-BIN vulnerability testing (Unix and IIS), SSH buffer overflow vulnerabilities, Current Sendmail vulnerabilities, IMAPD/POPD buffer overflow vulnerabilities, Current FTP and WU-FTP vulnerabilities, Tooltalk buffer overflow vulnerbilities, Netbus, Netbus-2, and Back Orifice vulnerabilities, Improved Operating System fingerprinting, Firewall-aware, Weekly updates, Probing for non-password accounts, NFS file systems exported to arbitrary hosts, NFS file systems exported to unprivileged programs, NFS file systems exported via the portmapper, NIS password file access from arbitrary hosts, REXD access from arbitrary hosts, X server access control disabled, Arbitrary files accessible via TFTP, Remote shell access from arbitrary hosts, Writable anonymous FTP home directory.
SATAN – Security Analysis Tool for Auditing Networks (or Security Administrator’s Tool for Analyzing Networks. SATAN is a remote network scanner, and is considered one of the best. In fact, it was the first truly user-friendly network scanner. It features an HTML interface, complete with forms to enter targets, tables to display results and context-sensitive tutorials that appear when a hole has been found. A must have for hackers and sysadmins alike)
SBC – SCSI Block Commands
SBP – SCSI-3 serial Bus Protocol
SCAM – SCSI Configured AutoMatically
SCC – SCSI Controller Commands
SCCS – Source Code Control System
SCIG – Secure Central internet Gateway (this gateway enables government bureaus and departments to securely access the Internet. It includes firewalls, virus detection systems and proactive intrusion detection systems)
SCR – Screen Saver
SCSA – Sun Common SCSI Architecture
SCSI – Small Computer System Interface
SD – ShowDown (an IRC script) / Single Density (a floppy disk type)
SDI – Single Document Interface
SDMI – Secure Digital Music Initiative (another attempts to eradicate illegal CD-duplication. SDMIs will be incorporated into CDs and will make it possible to trace pirated material and it’s creator)
SDMS – SCSI Device Management System
SDSL – Single-line Digital Subscriber Line
SDWB – Sega Dreamcast Web Browser (the web browser that comes with Sega Dreamcast)
SEC – second
SEG – S***-eating grin (mainly used in IRC)
SEQNUM – Sequence Number
SET – Saqueadores Edicion Tecnica (a Spanish computer security e-zine)
SF – Stellar Frontier (a realtime multiplayer space shooter that can be played over the Internet or a local intranet. See for more information)
SFS – Secure File System
SGC – SCSI Graphic Commands
SGI – Silicon Graphics Incorporated / Silicon Graphics Interface
SH – Shell
SIG – Special Interest Group
SIIA – Software and Information Industries Association
SIMD – Single Instructions Multiple Data
SIMM – Single Inline Memory Module
SIN – Self Induced Negotiativity (a security group.
SIP – SCSI-3 Interlocked Protocol
SIP – Surf In Peace
SISAL – Streams and Iteration in a Single Assignment Language
SITD – Still In The Dark
SIU – Stupid Internet User
SLIP – Serial Line Interface Protocol
SLL – Screw Looser Layer (this website is… uh… different…
SM – Sado Maso (not computer-related, you say? Ever heard of cybersex IRC?!)
SMB – Server Message Blocks
SMC – SCSI-3 Medium changer Commands
SMDS – Switched Multimegabit Data Service
SMP – Symmetrical Multiprocessing
SMPS – Server Merchant Payment System
SMTP – Simple mail Transfer/Transport Protocol
SNAFU – Situation normal, all f***ed up (mainly used in IRC)
SNK – Secure Net Key (a card that contains an encrypted password. Excellent against network sniffers and keyloggers, which will now be unable to catch the account information)
SO – Significant other (mainly used in IRC) / Source
SOI / SoI – Subversion of Information
SOL – Smilling out loud or sh*t out of luck (mainly used in IRC) / Scandinavia OnLine
SOME1 – Someone (mainly used in IRC)
SOMY – Sick of me yet? (mainly used in IRC)
SOP – Super OP (if you’re a SOP in a channel it means you get special OP rights which lower OPs don’t get. A SOP it one level above an AOP and one below a founder)
SPC – SCSI-3 Primary Commands
SPI – SCSI-3 Parallel Interface
SQL – Structure Query Language
SRC – Source
SRM – Security Reference Monitor (a component of NT’s security. SRM enforces access validation and auditing for LSA. It cheks user accounts as the user tries to access various files, directories, etc’, and either allows or denies access. Auditing messages are generated as a result. The SRM contains a copy of the access validation code to ensure that resources are protected uniformly throughout the system, regardless of resource type)
SS – Special Service / SubSeven (a remote administration tool)
SSC – SCSI Stream Commands
SSH – Secure Shell (SSH is a program to log into another computer over a network, to execute commands in a remote machine and to move files from one machine to another. It provides strong authentication and secure communications over insecure channels. It is intended as a replacement for rlogin, rsh, rcp and rdist)
SSI – Server Side Include
SSL – Secure Sockets Layer (a data transfer method. Used mainly to transfer credit card numbers and other valuable pieces of information)
STARCON – Star Control (a famous, great for it’s time and nostalgic space shooter and adventure game. There were three games in the series – Starcon 1, 2 and 3)
STD – Standard
STDOUT – Standard Output (whatever a command returns after it is executed. Errors, numbers, bits of information, whatever. For example: ping may return “ping: host unreachable” or “ping: – 302ms” etc’ etc’, all depending on the command, the OS or other software, whether it succeeds and many other boring factors)
STFW – Search the f*****g Web (mainly used in IRC)
STOA – Scientific and Technical Options Assessment
STROBE – The Super Optimized TCP Port Surveyor (a network scanner. More like a port scanner, only that it identifies what services are being run on the specified remote host. Very fast. Note: when running on Solaris 2.3 you have to run it with the -g flag for it to disable getpeername() in order to prevent a core dump)
STW – Search the Web (mainly used in IRC)
SU – Super User (type su and then it’ll ask you for superuser’s (root) password. Type it in, and walla! You’re root)
SUID – Set User ID
SUNEXP – Sun Expire (The Solaris (the default OS on Sun’s computers) useradd binary shipped with Solaris 7.0 has a bug which can possibly allow users who are supposed to be expired by a certain time to login. The problem with useradd is the interpretation of the value passed after the parameter -e (expire). If one were to use useradd to set an expiry date the following way: “-e 6/30/2000″ the interpretation would be June 30, 2020. The result of this vulnerability is having expired users having access to the vulnerable host. This bug is nicknamed SunExp)
SVC – Switched Virtual Circuit
SVGA – Super VGA (an enhanced VGA monitor. Supports about 16.7 Million colors)
SVID – “System V” Interface Definitor
SWAG – Stupid wild-a** guess (mainly used in IRC)
SYMLINK – Symbolic Link (the Unix equivelant to Windows’ shortcuts, only they’re much more powerful and customizable. For more info, type “man symlink” in a Unix prompt, without the quotes, of course)
SYN – (See ACK)
SYNC – Synchronize
SYS – System
SYSADMIN – System Administrator
SYSLOG – System Logger (see SYSLOGD)
SYSLOGD – System Logger Daemon (a program that comes with every Unix distribution AFAIK and logs stuff)
TAFN – That’s all for now (mainly used in IRC)
TANSTAAFL – There Ain’t No Such Thing As A Free Lunch (mainly used in IRC)
TAPI – Telephone Application Program Interface
TAS – Telephone Answering Service
TASS – Template ASSembly language (Intermediate language produced by the Manchester SISAL compiler)
TB – TaraByte (1,000 GBs)
TBA – To Be Arranged / To Be Announced
TBF – Mean Time Between Failures
TBG – Trojan B Gone (a local trojan scanner by Dark Eclipse software. See
TBIL – Tiny Basic Interpreter Language
TBK – Tool Builder Kit
TBL – A language by M.E. Lesk for formatting tables
TBS – Turn-Based Strategy
TCAUCE – The Coalition Against Unsolicited Commercial Email
TCB – Trusted Computing Base
TCP – Transfer Control Protocol (TCP is the connection-oriented, reliable transport protocol in the TCP/IP suite. Connection-oriented simply means that the two hosts participating in a discussion must first establish a connection before data may change hands. Reliability is provided in a number of means, but the two most important ones are data sequencing and acknowledgement. For acknowledgement, see the entry ACK. Now where were we? Oh, yeah, data sequencing. Since TCP is reliable, it must be able to recover from lost, duplicated, or out-of-order data. By assigning a sequence number to every byte transferred, and requiring an acknowledgement from the other end upon receipt, TCP can guarantee reliable delivery. The receiving end uses the sequence numbers to ensure proper ordering of the data and to eliminate duplicate data bytes. TCP sequence numbers can simply be thought of as 32-bit counters. They range from 0 to 4,294,967,295. Every byte of data exchanged across a TCP connection (along with certain flags) is sequenced. Now, how are sequence numbers set, you ask? Well, once a connection is starting to form (the first packet with the SYN flag on is sent), the sender of the SYN packet will set it’s sequence number as an ISN – Initial Sequence Number. The next packet that will be sent will have the sequence number of ISN+1, etc’. The sequence number field in the TCP header will contain the sequence number of the *first* byte of data in the TCP segment. The acknowledgement number field in the TCP header holds the value of next *expected* sequence number, and also acknowledges *all* data up through this ACK number minus one. TCP uses the concept of window advertisement for flow control. It uses a sliding window to tell the other end how much data it can buffer. Since the window size is 16-bits a receiving TCP can advertise up to a maximum of 65535 bytes. Window advertisement can be thought of an advertisement from one TCP to the other of how high acceptable sequence numbers can be. Other TCP header flags of note are RST (reset), PSH (push) and FIN (finish). If an RST is received, the connection is immediately torn down. RSTs are normally sent when one end receives a segment that just doesn’t jive with current connection. The PSH flag tells the receiver to pass all the data is has queued to the aplication, as soon as possible. The FIN flag is the way an application begins a graceful close of a connection (connection termination is a 4-way process). When one end receives a FIN, it ACKs it, and does not expect to receive any more data (sending is still possible, however))
TCP/IP – Transfer Control Protocol/Internet Protocol
TCSH / TSH – Turbo C Shell (an enhanced version of CSH. Usually located at /bin/tcsh or /usr/bin/tcsh)
TDD – Telecommunication Device for the Deaf
TDR – ime Domain Reflectometer (TDRs measure the propagation of fluctuation of electromagnetic waves. A TDR attached to your LAN will reveal unauthorized parties sucking data from your network. Hewlett Packard has one, and it’s available at
TDT – The Dream Team (a hacking group)
TERM – Terminal
TERMCAP – Terminal Capabilities (see TERMCAPFILE)
TERMCAPFILE – TERMinal CAPabilities FILE (a file mostly found on Unix systems (usually located at /etc/termcap, correct me if I’m wrong) which contains your terminal’s capabilities. For example: if your terminal is a screen, it’ll contain information about it, including it’s size, available colors, resolutions etc’)
TFH – Thread from hell (a discussion that just won’t die and is often irrelevant to the purpose of the forum or group) (mainly used in IRC)
TFS – Tough Fucking Shit
TGA – Truevision tarGA / Trusted Gateway Agent (see VVOS)
TGIF – Thank God it’s Friday (mainly used in IRC)
TGOD / TG0D – The Guardians Of Data (a security group.
TGP – Trusted Gateway Proxy (see VVOS)
TH – Trouble History
THC – The Hacker’s Choice (they make great hacker programs such as the amazing wardialer called THC-SCAN. They have a reputation for blowing away the competition and stomping very heavily on them.
THF – THe Hacker’s Fun
THG – The Humble Guys (a hacking group)
THOF – The Hand Of Fate
THP – The Hill People (a hacking group)
THTJ – The Havoc Technical Journal (an independent zine)
THX – Thanks (mainly used in IRC)
TIA – Tuniaisn Internet Agency / Thanks In Advance (used if you post a question and are expecting a helpful reply) (mainly used in IRC)
TIC – Tongue In Cheek
TIES – Time Independent Escape Sequence
TIF – Tagged Image File (format)
TIFF – Tag Image File Format
TIM – The Incredible Machine (an old computer game)
TISC – The Internet Security Conference
TLA – Three-letter acronym (mainly used in IRC)
TLK2UL8R – Talk to you later (mainly used in IRC)
TLS – Transport Layer Security
TMTOWTDI – There’s More Than One Way To Do It (Perl’s slogan. In case you’re wondering, Perl is a programming language)
TMW – TeleMate for Windows (a modem terminal program for Windows)
TNO – The New Order (a hacking group)
TOF – Top Of File
TOP – Teflon Oil Patch (a program that binds two executable files together with many cool options)
TOS – Terms Of Service / Type Of Service
TPTB – The powers that be (mainly used in IRC)
TRACERT – Traceroute (a Unix command. For more information, type ‘man tracert’ (without the quotes))
TREAT – Trouble Report Evaluation and Analysis Tool
TRSI – Tristar Red Sector Inc. (a hacking group)
TSR – Terminate and Stay Resident (a program that remains alive at all times, constantly listening for a particular event. When that event finally occurs, the TSR undertakes some action)
TTF – True Type Font
TTFN – Ta-Ta for now (mainly used in IRC)
TTL – Time To Live (the maximum times a data packet can bounce between a host to another host before it’s deleted)
TTY – TeleTYpe
TTYL – Talk to you later (mainly used in IRC)
TU – Thank you (mainly used in IRC)
TUCOWS – The Ultimate Collection Of Winsock Software
TUT – Tutorial
TWAIN – Technology With / Without An Important / Interesting Name
TWINKLE – The Weizmann Institute Key Locating Engine (a light-operated machine that can break any encrypted text or binary unless the key is larger than 516-bit. Twinkle is very different than that of the electronic design of a normal computer; Twinkle is based solely on optoelectronics, which use light to transfer info digitally. Shamir predicts that the Twinkle mechanism would be as effective as about 100 to 1,000 PCs. Not just that, but the machine could be easily built with little funding, Shamir says that a Twinkle machine could be built for as little as $5,000. On the other hand the DES Cracker cost the Us government $250,000 to build)
TXT – Text
TY – Thank You (mainly used in IRC)
U/L / UL – Upload
UAE – Unrecoverable Application Error (program crash)
UAPITA – You’re a pain in the ass (mainly used in IRC)
UART – Universal Asynchronous Receiver/Transmitter
UBE – Unsolicited Bulk e-mail
UC / U C – You see, … (mainly used in IRC)
UCE – Unsolicited Commercial e-mail
UCF – United Cracking Force (a cracking group)
UCITA – Uniform Computer Information Transaction Act ((taken in part from stupidest thing in the world. If this gets approved, vendors will have the right to repossess software by disabling it remotely (meaning you have to leave a port open on the firewall? Just imagine the DoS possibilities); prevent the transfer of licenses from one party to another without vendor permission (Does this include my cpy of LoadRunner for the Atari2600 that I sold for $5?); outlaw reverse engineering (whoa, no more third party security analysis). This new law is being supported by such software giants as Microsoft, Adobe and WinPro. the proposed legislation is set to go before the National Conferences of Commissioners on Uniform State Laws in July. If this panel approves this measure it will then be sent to state legislations around the country (good way to bypass the feds). Lucky us (Njan, F a n G and R a v e N), we live outside the US. Let’s just hope they won’t approve such thing in our countries too)
UDA – Universal Data Access
UDP – User Datagram Protocol (see IP)
UETF – Undernet Engineering Task Force
UHA / UHA1 – United Hackers Association (a hacking website. They have lots of newbies stuff but some good txts and a nice newsletter with many subscribers)
UHC – United Hackers Convention (UHC is a hackers convention which will be held in December 28th 1999 through January 1st 2000 in Las Vegas, Nevada.
UHS – Universal Hint System (suppose you play an adventure game and you get stuck. Now, a fully-detailed walkthrough will ruin your entire gaming experience, right? That’s what UHSs are for. Instead of telling you what to do, they give you clues and hints until you get it right. You can ask for more hints or more clues until they run out and only then, if you are stupid enough not to get it right after 117,538.2 hints you get the answer. Get UHSs at
UI – User Interface
UID – Unique ID / User ID (a number corresponding to an account. uid=0 is root most of the times)
UIN – Universal Identification Number (ICQ number)
ULG – United Lone Gunmen (a hacking group)
UNA / UNAB – Unabbreviate (see AB. To unabbreviate, type ‘:una blah’ without the ‘s)
UPS – Uninterruptable Power Supply
UR – You Are / Your
URL – Universal Resource Locator (also known as internet address)
URSELF – Yourself
US / U/S – Understand
USB – Univeral Serial Bus (a new type of slot (those little things at the back of your PC). Faster than any other slots and has many advantages over other slots. What advantages, you ask? Oh, puh-leese. Too many. Go read a book or something. Or a magazine)
USR – User
UTIL – Utility
UUCP – Unix to Unix Copy
UUDW – Union of United Death Workers (a hacking group)
UW – Ultra Wide [SCSI]
UW – You’re welcome (mainly used in IRC)
VAN – Virtual Area Network
VAR – Variable
VB – Visual Basic (a programming language)
VBG – Very Big Grin (mainly used in IRC)
VBP – Visual Basic Project (a programming language)
VBS – Visual Basic Scripting
VBSEG – Very big S***-eating Grin (mainly used in IRC)
VC – Virtual Coordinates
VCD – Video Compact Disc
VCPP – Visual C++
VDE – Verona Desktop Enhancer
VDSL – Very high BIT-rate Digital Subscriber Line (higher speeds than DSL, over shorter distances)
VDU – Video Display Unit
VER – Version
VGA – Video Graphics Array (a monitor which supports 256 colors)
VHDCI – Very High Density Cable Interconnect
VI – VIsual editor
VIA – Virtual Interface Architecture
VM – Virtual Machine (VM programs (such as VMWare) allow Unix users to install multiple OSs on their box without the need to repartition, as if they were running several boxes)
VMB – Voice Mail Box
VNC – Virtual Network Computing (by AT&T)
VOIP – Voice Over Internet Protocol (with this little baby you can make phone calls through the internet so there is no such thing as a long distance call, only local calls)
VPN – Virtual Private Network
VR – Virtual Reality
VRM – Voltage Regulation Module (regulates the voltage levels of your CPU. Included in all modern CPUs)
VRML – Virtual Reality Modeling Language (if you’ve got the a VRML plug-in such as cosmoplayer ( you can view 3D objects within webpages and interact with them. VRML can create movies and animations (including interactive animation and objects), 3D models that can be viewed from different angles and viewpoints and more)
VRT – Vertical
VT – Virtual Terminal
VV – Virtual Vault (see VVOS)
VVOS – Virtual Vault Operating System (HP’s solution to secure electronic commerce. It’s becoming very popular within big businesses like banks etc’. The main security mechanism in which VVOS is based upon is data partitioning. Data on the system is classified into one of four security classes, or “vaults” – INSIDE, OUTSIDE, SYSTEM and SYSTEM HIGH. The INSIDE vault generally contains the internet front end and any necessary CGI binaries, etc’. SYSTEm and SYSTEM HIGH are responsible for maintaining the external webpages and audit logs respectively. These vaults are totally segregated from each other and work essentially as seperate machines. If a program requires access to either of the vaults it must be authenticated by HP’s Trusted Gateway Proxy daemon. The TGP daemon filters all requests from the internet and forwards the to middleware server packages that safely reside behind the INSIDE vault)
VWM – Virtual Window Manager (a little program that allows you to have multiple desktops)
VX / VX Community – Virus Exchange Community
VXD – Virtual X (X=anything) Driver (Generally speaking, VxDs were written by Micro$oft for Windows to control a specific class of device such as printers, display adapters and etc. This allows a hardware manufacture to create small simple device drivers which contain only additional instructions needed for a specific device. These vender-supplied drivers are known as mini drivers. Many of these are also VxDs)
W – Write / Word
W/ – With
W3 – WWW (stands for World Wide Web)
W3C – WWW Consortium (WWW stands for World Wide Web)
WAN – Wide Area Network
WANG – Wide Area Network Group
WAV – Wave
WB – Welcome Back (mainly used in IRC)
WDALYIC – Who died and left you in charge? (mainly used in IRC)
WFM – Works for me (mainly used in IRC)
WIBNI – Wouldn’t it be nice if (mainly used in IRC)
WIL – Windows Interface Language
WINDOWS – Will Install Needless Data On Whole System ;)
WKP – Well Known Port
WM – Window Maker (a window manager for X-Windows, the popular GUI for Unix)
WMA – Windows Media Audio
WMF – Windows Meta File
WO / W/O – without (mainly used in IRC)
WON – World Opponent Network (a multiplayer gaming arena.
WORM – Write Once, Read Many (a type of media that can be written on only once, but can be read from as much as the user wants (kinda like CDRs))
WP / W/P – WallPaper / Word Processor / Word Perfect (a .doc editing software)
WT? – What/who the? (mainly used in IRC)
WTF – What the F***! (mainly used in IRC)
WTFO – What the F***! Over! (mainly used in IRC)
WTG – Way to go! (mainly used in IRC)
WTGP? – Want to go private? (mainly used in IRC)
WTV – Web TV
WTZ-UP – Whats Up (mainly used in IRC)
WU? – What’s up? (mainly used in IRC)
WUF? – Where are you from? (mainly used in IRC)
WWW – World Wide Web (or World Wide Wait, as some people call it)
WWWC – World Wide Web Consortium
WYPIWYG – Where You Point Is Where You Go
WYSIWYG – What You See Is What You Get (for example, Micro$oft Word is a WYSIWYG editor because it shows you what you’ll get when you’ll print your document. Old UNIX or DOS editors are mostly not WYSIWYG editors)
WYSIWYG – What you see is what you get (mainly used in IRC)
X – Execute
XIG – Xi Graphics Inc (
XML – Extended Markup Language
XMMS – X MultiMedia Systems (the best MP3 player for Unix.
XMS – Extended Memory Specifications
XOR – Exclusive OR (logic gate whose output is 1 if any, but not all, it’s inputs are 1st; otherwise, zero (0) (pronounced ex-or))
XP – Experience Point (when playing MUD your character is rated by an XP system. You get XPs for killing, learning, doing stuff or just hanging around. The more XPs you have the more powerful your character is)
XPG – X/Open Portability Guide
XTERM – XWindown Terminal (a terminal window that can be executed from XWindows, the UNIX equivelant for Microsoft’s nice n’ E-Z GUI)
Y – Why (mainly used in IRC)
Y2K – Year 2,000
YAWS – Yet Another Wingate Scanner
YBWC – Why? Because We Can
YGBSM – You gotta be s***tin’ me! (mainly used in IRC)
YMMV – Your Mileage May Vary (mainly used in IRC)
YMTC – You Make The Call
YOYOW – You Own Your Own Words (this means that you are responsible for the words that you post and that reproduction of those words without your permission in any medium outside the distribution of where you post it may be challenged by you, the author)
Yr – year
Z – S (Z stands for S in many “h4x0rish” terms or “warez” terms)
ZD – Zener Diode (semiconductor diode that has a well-defined turn-on voltage for conduction in the reverse direction)
ZIP – Zone Information Protocol
ZOU – Zone Of Unloaded (they’ve got some MP3s, cracks, games to download… a typical warez website.
ZSH – Z Shell (a UNIX shell. It’s kinda like a combination of TCSH, BASH, KSH and others. It is fairly easy to “migrate” to ZSH since it emulates most shells. Usually located at /bin/zsh. For more info go to
ZV port – Zoomed Video Port