A WetPC is a waterproof wearable computer built specifically to withstand high underwater pressure. It allows divers to gather and enter data when conducting underwater studies, then transfer the data to a desktop computer via a serial cable after returning to the surface.
Spim is the term for spam that is delivered via instant messenger or chat services. While the volume of Spim is not as bad as the volume of spam can be in our inboxes, it is more annoying in the sense that it displays directly when received, rather than being relegated to a junk or spam folder like it would in our inboxes.
User-Generated Content (UGC for short) refers to content such as information, data, news, reviews, blog posts, photos, videos, comments, etc. that an unpaid contributor has uploaded or provided to a website. Occasionally, the website in question will republish, promote, and/or possibly make a profit from User-Generated Content.
Typosquatting refers to the practice of registering slightly misspelled variants of popular ‘brand name’ URLs as domains. The hope is to catch people who mistype the URL of the official ‘brand name’ website, which then leads them to the ‘false’ one instead.
A Session Cookie (a.k.a. Transient Cookie) is a temporary cookie that only exists as long as the browser is open. Once the browser has been closed, the Session Cookie is immediately erased and ceases to exist, unlike normal cookies that have a set ‘expiration date’ and remain on a computer after the browser is closed.
Skinny Linux is an umbrella term that refers to any compact and/or very lightweight distribution of Linux such as Damn Small Linux and Puppy Linux for example. These versions of Linux are ideal for older hardware, hardware with limited resources, low-cost devices, etc.
RAT (short for Remote Access Trojan) refers to malware that allows an attacker to have remote administrator level control of an infected operating system. Once the malware has compromised a system, the attacker is free to do whatever they please such as: stealing personal/financial information, taking screenshots, stealing/deleting/altering files, accessing the system’s webcam if it has one, installing keyloggers, using the compromised system to infect other computers, etc.
Pseudocode refers to the use of natural language (instead of programming language) to create a detailed outline of what a particular program or algorithm is supposed to do, just like creating a detailed outline for a major paper or report.
A Quiet Zone refers to the blank areas (margins) on each side of bar codes. The Quiet Zone ‘tells’ barcode readers where a barcode starts and stops, thus preventing the readers from ‘seeing’ other information that is not part of the bar codes, thus avoiding an inaccurate or unreadable scan.
Pod Slurping (a.k.a. Slurping) refers to the unauthorized download of data and files from a computer using an iPod, other brand of mp3 player, flash drives, etc. The small size of these devices and ease of connection makes this method of data theft a quick and stealthy endeavor.
Feature Creep (a.k.a. scope creep and requirements creep) refers to the continued addition of new functions and features to a software or information system project during the development phase. The requests for new functions and/or features can come from the client’s desire for a ‘bigger and better’ product, or from the developers’ own desires to improve the product.
Infonesia (short for Information Amnesia) refers to the inability to remember where a particular item of information was seen or heard. The temporarily forgotten information can come from a variety of sources such as: mail, e-mail, newspapers, magazines, websites, radio, and/or TV.
Censorware is software that is set up to filter out and/or block access to websites containing: undesirable web content, age-inappropriate content, sexually explicit content, illegal download websites, social websites in work environments, etc. Parental controls and software that limit the websites children have access to also fall into this category of software.