Heading

The following is a glossary of technical terms used in A Tanto Thriller Series. Some of these terms exist in the real world. Their definitions are drawn from multiple sources on the Internet (Wikipedia, Techopedia.com, Dictonary.com, HowToGeek, etc.) Other terms only exist in this book series. This is not an all-inclusive list and will continue to grow.

  • Alviss – a proprietary private messaging application (also the name of the author’s favorite locksmith).
  • Anti-Virus – (of software) designed to detect and destroy computer viruses.
  • Basic Input Output System (aka BIOS) – code that instructs a computer on how to perform basic functions such as system booting and input controls.
  • Bay, The – historically, Guantanamo Bay was a place where people viewed by the United States of America as “enemies of the State” or “combatants” were incarcerated and interrogated. The author is unsure if this site officially continues its prior function.
  • Blog – a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
  • Bot (aka Robot) – an autonomous program on the internet or another network that can interact with systems or users.
  • Buffer (aka Buffering) – a temporary memory area in which data is stored while it is being processed or transferred, especially one used while streaming video or downloading audio.
  • Bug – an (intentional or unintentional) error in a computer program or system.
  • Bushi – a practitioner of the Way of the Samurai or the Bushido Code.
  • Bushido Code – the historic code of conduct for Japan's warrior classes, and the word "bushido" comes from the Japanese roots "bushi" meaning "warrior," and "do" meaning "path" or "way." 
  • Captures – the successful online trapping of individuals on the Internet.
  • CDs (aka Compact Discs) – a way to store data and music.
  • Chicken-Choker trap – an online trap where the victim is teased with something enticing and leads to his own capture by following his own (morbid) desires.
  • Coder eyes – a symptom of eye strain that occurs when the user spends too much time staring at a computer.
  • Compiler – a program that converts source code written in a programming language.
  • Dam Breaker – someone who breaks through firewalls.
  • Damascus – the forging of steel by heating, breaking, and reforming many times.
  • Dark Web – the part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.
  • Davidson Protocol – a set of rules that allow prisoners to donate work/time off to another prisoner.
  • Disciplinary chips – devices that are installed into a human body, gain their power from the same source, and provide electrical shocks via remote control.
  • Emulator – software that enables one computer system (called the host) to behave like another computer.
  • Faraday (aka Faraday Bag) – a device that removes the ability to receive or transmit data from a device.
  • Firewall – a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
  • Flash drives – finger-sized devices that connect to a computer and have room for storage.
  • Gig – a job or task to which someone is promised something in return for completion.
  • Hack – use of a tool (such as a computer, person, device, or situation) to gain unauthorized access to data in a system.
  • Hacker – a person who uses computers to gain unauthorized access to data.
  • Hackers’ Haven (aka Double-H) – a privatized prison that forces imprisoned hackers to hunt and secure other lawbreakers.
  • Hackvict – a convict that believes in using policy, action, or various forms of media to bring about political, economic, or social change.
  • Handle (aka Callsign or Username) – a person’s identifier when they log into a computer and how the prisoners of Hackers’ Haven are labelled.
  • HoneyBadger – a propriety operating system that uses components from both Linux and Windows operating systems.
  • Gakunodo – the tent where Bushido warriors rested; also, an efficient software that entices individuals online and records their (illegal) footsteps.
  • Internet Relay Chat (aka IRC) – a group communication device that uses text-based chats or instant messaging to correspond with individuals and share files.
  • IP Address – a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
  • Keylogger – a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
  • Kills – see “Captures.”
  • Kilobyte (aka KB) – a unit of memory or data equal to 1,024 (210) bytes.
  • Lap count – an interval between online pings.
  • Linux – an open-source operating system modelled on Unix.
  • Liquid Ocular Display Interceptor System (aka LODIS) – a device that records human eye and body movement through a watery substance.
  • Log file – file extension for an automatically produced file that contains a record of events (such as user choices) from certain software and operating systems.
  • Loopback – a static IP address used for testing integrated microchips.
  • Looping – the ability to copy files of a target computer without slowing down noticeable bandwidth or computing speed.
  • Malware – software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  • Megabyte (aka MB) – a unit of information equal to 220 bytes or, loosely, one million bytes.
  • Memory – the part of a computer in which data or program instructions can be stored for retrieval.
  • Neural Net – a computer system modeled on the human brain and nervous system.
  • Nintendo Time – when using an electronic device, this is the sensation that time is going slower than it actually is in the real world.
  • NumLk – the number lock key is a part of a keyboard that allows the user quick access to numbers.
  • Omni-Viewer – the (monitored) software that allows the prisoners of Hackers’ Haven access to the Internet and Dark Web.
  • Paratrenicha (aka “Crazy Russian Ants”) – Paratrenicha species near pubens. Ants that eat electronics (they really exist).
  • Ping – query (another computer on a network) to determine whether there is a connection to it.
  • Pods (aka Med Pods) – full body sized machines that detect abnormalities and illnesses in individuals.
  • Portable Document Format (aka PDF) – a versatile file format created by Adobe that gives people an easy, reliable way to present and exchange documents – regardless of the software, hardware, or operating systems being used by anyone who view them.
  • POS – stands for piece of shit, and is a computer made from scrap parts.
  • Program Lidocaine – A computer worm that, once entered into a computer system, slows the system down until the system crashes.
  • Radio Frequency Identification (aka RFID) – denoting technologies that use radio waves to identify people or objects carrying encoded microchips.
  • Random Access Memory (aka RAM) – a type of data storage used in computers that is volatile and erased when a computer is turned off.
  • Randomizer – a piece of software that scrambles data or information.
  • Root – a user account with full and unrestricted access to a system.
  • Rootkit – a set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
  • Scanner – a device that scans documents and converts them into digital data.
  • Scripts – slang for computer code.
  • SkipTrace – a piece of software that takes the actual distance from the ping's source, the time at each occurrence, the bandwidth downloaded and uploaded to various IP sources, and strength and number of Internet connected devices in a known area as well as the draw of power from the utility company to calculate a user’s location.
  • Software Patch – a downloaded series of files that fix a bug in a piece of software.
  • Solo – a piece of software that does not interact with other software; a hack involving software (or a software system) that forbids the use of additional software.
  • Tamahagane – a way of making a Japanese sword. The word tama means "round and precious," like a gem, while the word hagane means "steel."
  • Terabyte (aka TB) – a unit of information equal to one million million (1012) or, strictly, 240 bytes.
  • Terminal – see workstation.
  • Test Program Set (aka TPS) Report – “a document describing the step-by-step process in which an engineer tests and re-tests software or an electronics system.” This definition is courtesy of Mike Judge, former engineer and programmer for a subcontractor working on military jets and the creator of Office Space.
  • Theia – software that allows residents of Hackers’ Haven access to the Dark Web.
  • Timed out – a period of inactivity has passed that causes a software program to shut down.
  • Torrent – a file-sharing protocol based on peer-to-peer (P2P) technology that allows vast numbers of users to connect and share content without having to rely on a single source for downloads.
  • Tracer bullet – a piece of computer code that follows the trail of another piece of computer code and estimates possible objectives.
  • Units – rewards for successful captures, can be redeemed for food, non-essentials, or parole.
  • Unix – a widely used multiuser operating system.
  • Virtual Private Network (aka VPN) – an arrangement whereby a secure, apparently private, network is achieved using encryption over a public network, typically the internet.
  • Virus (aka Computer Virus) – a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  • War Room – a classroom-style arrangement of computer workstations where captures and the prevention of hacks occur.
  • Windows – a widely used single user operating system.
  • Workstation – a computer monitor, keyboard, mouse, and computer connected to the servers and Internet.
  • Worm – a standalone malware computer program that relies on security failures and replicates itself in order to spread to other computers.
  • Zipped – a compressed file that consists of one or several other files.
Print | Sitemap
© Hustle Valley Press, LLC- IONOS MyWebsite