Lamer
   HOME
*





Lamer
Lamer is a jargon or slang name originally applied in cracker and phreaker culture to someone who did not really understand what they were doing. Today it is also loosely applied by IRC, BBS, demosceners, and online gaming users to anyone perceived to be contemptible. In general, the term has come to describe someone who is willfully ignorant of how things work. It is derived from the word "lame". A lamer is sometimes understood to be the antithesis of a hacker. While a hacker strives to understand the mechanisms behind what they use, even when such extended knowledge would have no practical value, a lamer only cares to learn the bare minimum necessary to operate the device in the way originally intended. Origin At least one example of the term "lamer" to mean "a dull, stupid, inept, or contemptible person" appeared as early as 1961. It was popularized among Amiga crackers of the mid-1980s by "Lamer Exterminator", a notable Amiga virus, which gradually corrupted non-write-protecte ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Lamer Exterminator
Lamer Exterminator is a computer virus created for the Amiga. It was first detected in Germany in October 1989. It is a boot block virus contained in the first 1024 bytes of the disk. It is notable as the first virus known to be defensive. It hooks into the system in such a way that examining a bootblock will return a normal result and upon replicating will also encrypt itself. Variants of the virus are known to use one of three different decrypt routines defined by The Amiga Virus Encyclopedia.The Amiga Virus Encyclopedilink/ref> A detection program can look for any of the known decrypt routines on the boot block area of the disk, or alternatively try to blindly brute force decrypt them. The first decrypt routine is a simple XOR of every byte which only takes a maximum of 256 attempts to decrypt. The next includes an add byte in its decrypt routine, and takes a maximum of 256×256 attempts. The third uses 16 bit words in its decrypt routine, and takes a maximum of 65535×65535 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Luser
Before the popularization of the Internet in the 1990s, Internet slang defined a luser (sometimes expanded to local user; also luzer or luzzer) as a painfully annoying, stupid, or irritating computer user.p. 214 The word is a blend of "loser" and "user".p. 244 Among hackers, the word ''luser'' takes on a broad meaning, referring to any normal user (in other words, not a "guru"), with the implication the person is also a loser. The term is partially interchangeable with the hacker term ''lamer''. The term can also signify a layman with only user account privileges, as opposed to a power user or administrator, who has knowledge of, and access to, superuser accounts; for example, an end luser who cannot be trusted with a root account for system administration. It is popular with technical support staff who have to deal with lusers as part of their job, often metaphorically employing a LART (Luser Attitude Readjustment Tool, also known as a clue-by-four, cluestick, or cluebat), ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Script Kiddie
A script kiddie, skiddie, kiddie, or skid is an unskilled individual who uses scripts or programs developed by others, primarily for malicious purposes. Characteristics In a Carnegie Mellon report prepared for the U.K. Department of Defense in 2000, script kiddies are defined as The more immature but unfortunately often just as dangerous exploiter of security lapses on the Internet. The typical script kiddy uses existing and frequently well known and easy-to-find techniques and programs or scripts to search for and exploit weaknesses in other computers on the Internet—often randomly and with little regard or perhaps even understanding of the potentially harmful consequences. Script kiddies have at their disposal a large number of effective, easily downloadable programs capable of breaching computers and networks. Script kiddies vandalize websites both for the thrill of it and to increase their reputation among their peers. Some more malicious script kiddies have used virus to ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Jargon
Jargon is the specialized terminology associated with a particular field or area of activity. Jargon is normally employed in a particular Context (language use), communicative context and may not be well understood outside that context. The context is usually a particular occupation (that is, a certain trade, profession, vernacular or academic field), but any ingroups and outgroups, ingroup can have jargon. The main trait that distinguishes jargon from the rest of a language is special vocabulary—including some words specific to it and often different word sense, senses or meanings of words, that outgroups would tend to take in another sense—therefore misunderstanding that communication attempt. Jargon is sometimes understood as a form of technical slang and then distinguished from the official terminology used in a particular field of activity. The terms ''jargon'', ''slang,'' and ''argot'' are not consistently differentiated in the literature; different authors interpret the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Slang
Slang is vocabulary (words, phrases, and linguistic usages) of an informal register, common in spoken conversation but avoided in formal writing. It also sometimes refers to the language generally exclusive to the members of particular in-groups in order to establish group identity, exclude outsiders, or both. The word itself came about in the 18th century and has been defined in multiple ways since its conception. Etymology of the word ''slang'' In its earliest attested use (1756), the word ''slang'' referred to the vocabulary of "low" or "disreputable" people. By the early nineteenth century, it was no longer exclusively associated with disreputable people, but continued to be applied to usages below the level of standard educated speech. In Scots dialect it meant "talk, chat, gossip", as used by Aberdeen poet William Scott in 1832: "The slang gaed on aboot their war'ly care." In northern English dialect it meant "impertinence, abusive language". The origin of the word is ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Software Cracking
Software cracking (known as "breaking" mostly in the 1980s) is the modification of software to remove or disable features which are considered undesirable by the person cracking the software (software cracker), especially copy protection features (including protection against the manipulation of software, serial number, hardware key, date checks and disc check) or software annoyances like nag screens and adware. A crack refers to the means of achieving, for example a stolen serial number or a tool that performs that act of cracking. Some of these tools are called keygen, patch, loader, or no-disc crack. A keygen is a handmade product serial number generator that often offers the ability to generate working serial numbers in your own name. A patch is a small computer program that modifies the machine code of another program. This has the advantage for a cracker to not include a large executable in a release when only a few bytes are changed. A loader modifies the startup flow ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Phreaker
Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term ''phreak'' is a sensational spelling of the word ''freak'' with the ''ph-'' from ''phone'', and may also refer to the use of various audio frequencies to manipulate a phone system. ''Phreak'', ''phreaker'', or ''phone phreak'' are names used for and by individuals who participate in phreaking. The term first referred to groups who had reverse engineered the system of tones used to route long-distance calls. By re-creating these tones, phreaks could switch calls from the phone handset, allowing free calls to be made around the world. To ease the creation of these tones, electronic tone generators known as blue boxes became a staple of the phreaker community. This community included future Apple Inc. cofounders Steve Jobs and Steve Wozniak. The blue box er ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Bulletin Board System
A bulletin board system (BBS), also called computer bulletin board service (CBBS), is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user can perform functions such as uploading and downloading software and data, reading news and bulletins, and exchanging messages with other users through public message boards and sometimes via direct chatting. In the early 1980s, message networks such as FidoNet were developed to provide services such as NetMail, which is similar to internet-based email. Many BBSes also offer online games in which users can compete with each other. BBSes with multiple phone lines often provide chat rooms, allowing users to interact with each other. Bulletin board systems were in many ways a precursor to the modern form of the World Wide Web, social networks, and other aspects of the Internet. Low-cost, high-performance asynchronous modems drove the use of online services and BBSes t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Demoscene
The demoscene is an international computer art subculture focused on producing demos: self-contained, sometimes extremely small, computer programs that produce audiovisual presentations. The purpose of a demo is to show off programming, visual art, and musical skills. Demos and other demoscene productions (graphics, music, videos, games) are shared at festivals known as demoparties, voted on by those who attend and released online. The scene started with the home computer revolution of the early 1980s, and the subsequent advent of software cracking. Crackers altered the code of video games to remove copy protection, claiming credit by adding introduction screens of their own (" cracktros"). They soon started competing for the best visual presentation of these additions. Through the making of intros and stand-alone demos, a new community eventually evolved, independent of the gaming and software sharing scenes. Demoscene productions can be made with the latest consumer techno ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Online
In computer technology and telecommunications, online indicates a state of connectivity and offline indicates a disconnected state. In modern terminology, this usually refers to an Internet connection, but (especially when expressed "on line" or "on the line") could refer to any piece of equipment or functional unit that is connected to a larger system. Being online means that the equipment or subsystem is connected, or that it is ready for use. "Online" has come to describe activities performed on and data available on the Internet, for example: "online identity", "online predator", "online gambling", "online game", "online shopping", "online banking", and "online learning". Similar meaning is also given by the prefixes "cyber" and "e", as in the words " cyberspace", "cybercrime", "email", and "ecommerce". In contrast, "offline" can refer to either computing activities performed while disconnected from the Internet, or alternatives to Internet activities (such as shopping in br ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Video Game
Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, controller, keyboard, or motion sensing device to generate visual feedback. This feedback mostly commonly is shown on a video display device, such as a TV set, monitor, touchscreen, or virtual reality headset. Some computer games do not always depend on a graphics display, for example text adventure games and computer chess can be played through teletype printers. Video games are often augmented with audio feedback delivered through speakers or headphones, and sometimes with other types of feedback, including haptic technology. Video games are defined based on their platform, which include arcade video games, console games, and personal computer (PC) games. More recently, the industry has expanded onto mobile gaming through smartphones and tablet computers, virtual and augmented reality systems, and remote c ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hacker (hobbyist)
The hacker culture is a subculture of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of software systems or electronic hardware (mostly digital electronics), to achieve novel and clever outcomes. The act of engaging in activities (such as programming or other mediaThe Hacker Community and Ethics: An Interview with Richard M. Stallman, 2002
(gnu.org)
) in a spirit of playfulness and exploration is termed ''hacking''. However, the defining characteristic of a is not the activities performed themselves (e.g.
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]