HOME
*





Black Fax
The term black fax refers to a prank fax transmission, consisting of one or more pages entirely filled with a uniform black tone. The sender's intention is generally to use up as much of the recipient's fax ink, toner, or thermal paper as possible, thus costing the recipient money, as well as denying the recipient use of their own machine (similar to computer-based denial of service attacks). This is made easier because fax transmission protocols compress the solid black image very well, so a very short fax call can produce many pages. Black faxes have been used to harass large institutions or government departments, to retaliate against the senders of junk faxes, or merely as simple pranks. The basic principle of a black fax can be extended to form a ''black fax attack.'' In this case, one or more sheets are fed halfway through the sender's fax machine and taped end to end, forming an endless loop that cycles through the machine. Not only can solid black be used, but also images ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Prank
A practical joke, or prank, is a mischievous trick played on someone, generally causing the victim to experience embarrassment, perplexity, confusion, or discomfort.Marsh, Moira. 2015. ''Practically Joking''. Logan: Utah State University Press. A person who performs a practical joke is called a "practical joker" or "prankster". Other terms for practical jokes include gag, rib, jape, or shenanigan. Practical jokes differ from confidence tricks or hoaxes in that the victim finds out, or is let in on the joke, rather than being talked into handing over money or other valuables. Practical jokes are generally lighthearted and without lasting effect; they aim to make the victim feel humbled or foolish, but not victimized or humiliated. Thus most practical jokes are affectionate gestures of humour and designed to encourage laughter. However, practical jokes performed with cruelty can constitute bullying, whose intent is to harass or exclude rather than reinforce social bonds throu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Toner
Toner is a powder mixture used in laser printers and photocopiers to form the printed text and images on paper, in general through a toner cartridge. Mostly granulated plastic, early mixtures only added carbon powder and iron oxide, however, mixtures have since been developed containing polypropylene, fumed silica, and various minerals for triboelectrification. Toner using plant-derived plastic also exists as an alternative to petroleum plastic. Toner particles are melted by the heat of the fuser, and are thus bonded to the paper. In earlier photocopiers, this low-cost carbon toner was poured by the user from a bottle into a reservoir in the machine. Later copiers, and laser printers from the first 1984 Hewlett-Packard LaserJet, feed directly from a sealed toner cartridge. Laser toner cartridges for use in color copiers and printers come in sets of cyan, magenta, yellow and black (CMYK), allowing a very large color gamut to be generated by mixing. Composition, size and ma ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Denial Of Service
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. More sophisticated strategies are required to mitigate this type of attack, as simply attempting to block a single source is insufficient because there are multiple sources. A DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, thus disrupting trade. Criminal perpetrators of DoS attacks oft ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Junk Fax
Junk faxes are a form of telemarketing where unsolicited advertisements are sent via fax transmission. Junk faxes are the faxed equivalent of spam or junk mail. Proponents of this advertising medium often use the terms ''broadcast fax'' or ''fax advertising'' to avoid the negative connotation of the term ''junk fax''. Junk faxes are generally considered to be a nuisance since they waste toner, ink and paper in fax machines. History Junk faxing came into widespread use in the late 1980s as a result of the development and proliferation of relatively inexpensive desktop fax machines which resulted in rapid growth in the number of fax machines in the U.S. The invention of the computer-based fax board in 1985 by Dr. Hank Magnuski, provided an efficient platform for reaching those fax machines with minimal cost and effort. The fax machines of this period typically used expensive thermal paper and a common complaint about junk faxes was that they consumed that expensive paper without pe ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Fax Server
A fax server is a system installed in a local area network (LAN) server that allows computer users whose computers are attached to the LAN to send and receive fax messages. Alternatively the term ''fax server'' is sometimes used to describe a program that enables a computer to send and receive fax messages, set of software running on a server computer which is equipped with one or more fax-capable modems (or dedicated fax boards) attached to telephone lines or, more recently, software modem emulators which use T.38 ("Fax over IP") technology to transmit the signal over an IP network. Its function is to accept documents from users, convert them into faxes, and transmit them, as well as to receive fax calls and either store the incoming documents or pass them on to users. Users may communicate with the server in several ways, through either a local network or the Internet. In a big organization with heavy fax traffic, the computer hosting the fax server may be dedicated to that func ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Lace Card
A lace card is a punched card with all holes punched (also called a whoopee card, ventilator card, flyswatter card, or IBM doily). They were mainly used as practical jokes to cause disruption in card readers. Card readers tended to jam when a lace card was inserted, as the resulting card had too little structural strength to avoid buckling inside the mechanism. Card punches could also jam trying to produce cards with all holes punched, owing to power-supply problems. When a lace card was fed through the reader, a card knife or card saw (a flat tool used with punched card readers and card punches) was needed to clear the jam. See also * Black fax * Christmas tree packet * Denial of service * List of practical joke topics This is a list of practical joke topics (also known as a prank, gag, jape or shenanigan) which are mischievous tricks or jokes played on someone, typically causing the victim to experience embarrassment, perplexity, confusion, or discomfort. Pra ... Note ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Zip Bomb
In computing, a zip bomb, also known as a decompression bomb or zip of death, is a malicious archive file designed to crash or render useless the program or system reading it. It is often employed to disable antivirus software, in order to create an opening for more traditional malware. A zip bomb allows a program to function normally, but, instead of hijacking the program's operation, creates an archive that requires an excessive amount of time, disk space, or memory to unpack. Most modern antivirus programs can detect whether a file is a zip bomb in order to avoid unpacking it. Details and use A zip bomb is usually a small file for ease of transport and to avoid suspicion. However, when the file is unpacked, its contents are more than the system can handle. One example of a zip bomb is the file ''42.zip'', which is a zip file consisting of 42 kilobytes of compressed data, containing five layers of nested zip files in sets of 16, each bottom-layer archive containing a 4.3-g ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Denial-of-service Attack
In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. More sophisticated strategies are required to mitigate this type of attack, as simply attempting to block a single source is insufficient because there are multiple sources. A DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, thus disrupting trade. Criminal perpetrators of DoS attacks oft ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

List Of Practical Joke Topics
This is a list of practical joke topics (also known as a prank, gag, jape or shenanigan) which are mischievous tricks or jokes played on someone, typically causing the victim to experience embarrassment, perplexity, confusion, or discomfort. Practical jokes differ from confidence tricks or hoaxes in that the victim finds out, or is let in on the joke, rather than being fooled into handing over money or other valuables. Practical jokes or pranks are generally lighthearted, reversible and non-permanent, and aim to make the victim feel foolish or victimised to a degree, but may also involve cruelty and become a form of bullying if performed without appropriate finesse. Practical jokes 0–9 * 2004 Harvard–Yale prank A * Alhokm Baad Almozawla * April Fools' Day * List of April Fools' Day jokes B * Berners Street hoax * Bingo Shooting Device * Black fax C * Caltech–MIT rivalry * Candid Camera * Capping stunt * Josiah S. Carberry * Chewing gum bug * Chinese finger trap ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Practical Jokes
A practical joke, or prank, is a mischievous trick played on someone, generally causing the victim to experience embarrassment, perplexity, confusion, or discomfort.Marsh, Moira. 2015. ''Practically Joking''. Logan: Utah State University Press. A person who performs a practical joke is called a "practical joker" or "prankster". Other terms for practical jokes include gag, rib, jape, or shenanigan. Practical jokes differ from confidence tricks or hoaxes in that the victim finds out, or is let in on the joke, rather than being talked into handing over money or other valuables. Practical jokes are generally lighthearted and without lasting effect; they aim to make the victim feel humbled or foolish, but not victimized or humiliated. Thus most practical jokes are affectionate gestures of humour and designed to encourage laughter. However, practical jokes performed with cruelty can constitute bullying, whose intent is to harass or exclude rather than reinforce social bonds through ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Sabotage
Sabotage is a deliberate action aimed at weakening a polity, effort, or organization through subversion, obstruction, disruption, or destruction. One who engages in sabotage is a ''saboteur''. Saboteurs typically try to conceal their identities because of the consequences of their actions and to avoid invoking legal and organizational requirements for addressing sabotage. Etymology The English word derives from the French word , meaning to "bungle, botch, wreck or sabotage"; it was originally used to refer to labour disputes, in which workers wearing wooden shoes called interrupted production through different means. A false etymology, popular but incorrect account of the origin of the term's present meaning is the story that poor workers in the Belgian city of Liège would throw a wooden into the machines to disrupt production. One of the first appearances of and in French literature is in the of d'Hautel, edited in 1808. In it the literal definition is to 'make nois ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]