Will you talk Nerdy to me???!


Question: Gosh! I am drawing a Liger, "It's pretty much my favorite animal. It's like a lion and a tiger mixed... bred for its skills in magic."
~ taken from Napoleon Dynamite.


Answers: Gosh! I am drawing a Liger, "It's pretty much my favorite animal. It's like a lion and a tiger mixed... bred for its skills in magic."
~ taken from Napoleon Dynamite.

LOL i pwn j00 n00bs LOLOL

Wanna play world of warcraft with me?

pocket protecter, Bosco, footie jammies, Cream of Wheat.

i wan to upgrade your 56k modem to a T3 LAN LINE CONNECTION!

*** snort snort - "Did I do that?" - snort snort ***

I have some really good pens in my pocket for you. I need some scotch tape for my thick glasses. I won't be able to read my computer science books if my glasses aren't fixed.

yes that is a protractor in my pants

sure anything for u

can i plug my usb in your port

You look like a dweeb

Electrical stimulation is transmitted via synapses, which are located at various points along the dendritic branches. Dendrites play a critical role in receiving these synaptic inputs. Because dendritic spines are important for synaptic function and memory formation, understanding of septins may help to prevent the loss of spines and synapses that accompanies many neurodegenerative diseases. Septin could be a potential target protein to treat these diseases

would you like a go on my calculator it has extra comfort grip pads and a new intergrated lcd screen and can slove a eqaution in 0.3 seconds flat

Dungeons and Dragons in friggin' awesome! You wouldn't understand, because I know all about it. I also enjoy Star Trek. It's the best show on television. I especially like Mr. Spok.

Did you know that ancient DNA retrieved from the bones of two Neanderthals suggests that at least some of them had red hair and pale skin, scientists report in the journal Science. The international team says that Neanderthals' pigmentation may even have been as varied as that of modern humans, and that at least 1 percent of Neanderthals were likely redheads.......

127.0.0.1 is the standard IP address
used for a loopback network connection.
This means that if you try to connect to 127.0.0.1, you are immediately looped back to your own machine.
If you telnet, ftp, etc... to 127.0.0.1, you are connected to your own machine.
In other words, 127.0.0.1 is you.
For example, if your system was named "joker", and you attempted to telnet to 127.0.0.1, you would see:
# telnet 127.0.0.1
Trying 127.0.0.1...
Connected to joker
Escape character is '^]'.
Convincing newbie's to connect to 127.0.0.1 is a frequent joke on the Internet.
Another name for 127.0.0.1 is localhost.
Although 127.0.0.1 is the most commonly utilized address for localhost, any IP address in the 127.*.*.* range should also function in the same manner.

Do you have any pens I could put in my pocket protector?

rebel talk is cheat
words can only be expressed at the end of a saber
oops was that your bra strap

What are you 13 years old get some class!

There are 1000 bites in a mega bite

Will you please pass me my new pocket protector?

I just programmed a calculator software that can work on Windows and Linux too.
I can't wait till Christmas, because I will get a new pocket protector!
lol

I have an autograph from Bill Gates. hehe!

My handy dandy computer machine is MUCH better than yours. :-P

The Geek Alphabet:

-A-
Access Provider: Company that sells Internet connections. Known also as Internet Access or Service Providers (IAPs or ISPs).

Anonymous FTP server: A remote computer, with a publicly accessible file archive, that accepts "anonymous" as the log-in name and an E-mail address as the password.

Altavista:Web and Usenet search engine at: http://www.altavista.digital.com

AOL: America on Line: Presently, the worlds most populous Online Service.

Archie: Program that searches Internet FTP archives by file name.

ASCII: American Standard Code for Information Interchange. A text format readable by all computers. Also called "plain text".

Attachment: File included with E-mail.

-B-
Bandwidth: Size of the data pipeline. The fatter the bandwidth, the faster data can flow.

BBS: Bulletin Board System. A computer system accessible by modem. Members can dial in and leave messages, send E-mail, play games, and trade files with other users.

Binary file: All non-plain text files are binaries, including programs, word processor documents, images, sound clips, and compressed files.

Bookmarks: Netscape file used to store addresses.

Bounced mail: E-mail returned to sender.

Bps: Bits per second. The rate that data is transferred between two modems. A bit is the basic unit of data.

Browser: Program, such as Netscape or Internet Explorer, that allows you to download and display Web documents.

-C-
Cache: A place where a browser stores Web documents that have been retrieved. The cache may be on the hard disk, in memory, or a combination of the two. Documents you 'return to' are retrieved from the cache, which saves transmission time.

Client: Program that accesses information across a network, such as a Web browser or newsreader.

Compressed Files: Computer files that have been reduced in size by a compression program. Such programs are available for all computer systems, WinZip being the most common. For PCs and Stuffit or PackIt for the Macintosh.

Crash: When a program or operating system fails to respond or causes other programs to malfunction.

Cyberspace: Term referring to the virtual world that exists within the marriage of computers, telecommunication networks, and digital media.

D

Digital signing: Encrypted data appended to a message to identify the sender.

Direct connection: Connection, such as SLIP or PPP, whereby your computer becomes a live part of the Internet. Also called full IP access.

DNS: Domain Name System: The system that locates the numerical IP address corresponding to a host name.

Domain: Part of the DNS name that specifies details about the host, such as its location and whether it is part of a commercial (.com), government (.gov), or educational (.edu) entity.

Download: Retrieve a file from a host computer. Upload means to send one the other way.


E

E-mail: Electronic mail carried on the Net. E-mail address: The unique private Internet address to which your E-mail is sent. Takes the form of user@host. Emoticon: The techie name for small symbols created using typed characters.

Encryption: The modification of data so that unauthorised recipients cannot use or understand it.

Eudora: Popular E-mail program for Mac and PC.


F

FAQ: Frequently Asked Questions. Document that answers the most commonly asked questions on a particular subject. Every newsgroup has at least one.

Favorites: The term used by Internet Explorer for its bookmark list.

File: Anything stored on a computer, such as a program, image, or document.

Freeware: Same as Shareware - software provided free by its creator.

FTP: File Transfer Protocol. Standard method of moving files across the Internet.


G

GIF: Graphic Image File format. A compressed graphics format commonly used on the Net.

Gateway: A system by which two incompatible networks or applications can communicate with each other.

Gopher: Menu-based system for retrieving Internet archives, usually organised by subject.


upBack to top

H

Home page: Either the first page loaded by your browser at start-up, or the main Web document for a particular group, organisation or person.

Host: Computer that offers some sort of service to networked users.

HotBot: Web and Usenet search at: http://www.hotbot.com

HTML: HyperText Markup Language. The language used to create Web documents.

HyperText Links: The "clickable" links that connect pages on the Web to each other.

I

Image Map: A Web image that contains multiple links. Which link you take depends on where you click.

IMAP: Internet Message Access Protocol. Standard E-mail access protocol. Can selectively retrieve messages or parts thereof as well as manage folders on the server.

Infoseek: Web and Usenet search service at: http://www.infoseek.com

Internet: A cooperatively run global connection of computer networks with a common addressing scheme.

Internet Explorer: The now-dominant Web browser produced by Microsoft.

Internet Favourites: Internet Explorer directory that stores filed URLs.

IOL: Ireland on Line. Ireland's largest Internet Service Provider.

IP: Internet Protocol. The most important protocol upon which the Internet is based. Defines how packets of information get from source to destination.

IP address: Every computer connected to the Internet has an IP address (written in dotted numerical notation), which corresponds to its domain name. Domain Name Servers convert one to the other.

IRC: Inter Relay Chat. Internet system where you can chat in text, or audio, to others in real time, like an online version of CB radio.

ISDN: Integrated Services Digital Network. An international standard for digital communications over telephone lines, which allows for the transmission of data at 64 or 128 kbps.

ISP: Internet Service Provider. Company that sells access to the Internet.


J

Java: Platform independent programming language designed by Sun Microsystems. http://www.sun.com

JPEG: Graphic file format preferred by Net users because its high compression reduces file size, and thus the time it takes to transfer.


K

Kill file: Newsreader file into which you can enter keywords and E-mail addresses to stop unwanted articles.

L

LAN: Local Area Network. A computer network that covers only a small area (often a single office or building). Latency: Length of time it takes data to reach its destination.

Leased line: A dedicated telecommunications connection between two points.

LISTSERV lists: Mailing lists that act as newsgroups. Messages sent to a LISTSERV address are sent to everyone who has subscribed to the list. Responses are sent back to the LISTSERV address.

Logging on: Computer jargon for getting permission from a computer to use its services. A 'logon' procedure usually involves typing in a username (also known as an account name or user ID) and a password. This procedure makes sure that only authorised people can use the computer. Also known as logging in.

Lycos: Free Web search service at: http://www.lycos.com


M

Mail server: 1. A program that distributes computer files or information in response to E-mail requests. 2. A program that handles incoming E-mail for a host.

Mailing list: A list of mail addresses to which a single message can be sent by entering just one name as the To address. Also refers to discussion groups based on the mailing list. Each message sent to the group is sent to everyone on the list. (LISTSERV groups are mailing list groups.)

Megabyte: A measure of the quantity of data. A megabyte is a lot when you are talking about files containing simple text messages, but it's not much when you're talking about files containing colour photographs.

MIME: Multipurpose Internet Mail Extensions. Standard for the transfer of binary E-mail attachments.

Modem: MOdulator/DEmodulator. Device that allows a computer to communicate with another over a standard telephone line, by converting the digital data into analog signals and vice versa.

Mosaic: The first point and click Web browser, now superseded.

MPEG: A compressed video file format.


N

Name server: Host that translates domain names into IP addresses.

The Net: The Internet.

Netiquette: Internet etiquette, the correct form of behaviour to use while working on the Internet and in Usenet

Netscape: Popular and infuential Web browser - and the company that produces it.

Newbie: Newcomer to the Net, discussion, or area.

Newsgroups: Usenet message areas, or discussion groups, organised by subject hierarchies.

NNTP: Network News Transfer Protocol. Standard for the exchange of Usenet articles across the Internet.

Node: Any device connected to a network.

P

Packet: A unit of data. In data transfer, information is broken into packets, which then travel independently through the Net. An Internet packet contains the source and destination addresses, an identifier, and the data segment.

Packet loss: Failure to transfer units of data between network nodes. A high percentage makes transfer slow or impossible.

Platform: Computer operating system, like Mac system 7.0, Windows 95, or UNIX.

Plug-in: Program that fits into another.

POP3: Post Office Protocol. An E-mail protocol that allows you to pick up mail from anywhere on the Net, even if you're connected through someone else's account.

POPs: Points of Presence. An access provider's range of local dial-in points.

Post: To send a public message to a Usenet newsgroup.

PPP: Point to Point Protocol. This allows your computer to join the Internet via a modem. Each time you log in, you're allocated a temporary IP address.

Protocol: An agreed way for two network devices to talk to each other.


R

Robot: Program that automates Net tasks like collating search engine databases. Also called a Bot.

S

Server: Computer that makes services available on a network.

Signature file: Personal footer that can be automatically attached to E-mail and Usenet postings.

SLIP: Serial Line Internet Protocol. Protocol that allows a computer to join the Internet via a modem and requires that you have a pre-allocated fixed IP address configured in your TCP/IP setup. It's slowly being replaced by PPP.

SMTP: Simple Mail Transfer Protocol. Internet protocol for transferring mail.

Spam: Inappropriately post the same message to multiple newsgroups.

Streaming: Delivered in real time instead of waiting for the whole file to arrive, e.g. Real Audio.

Stuffit: A common Macintosh file compression format and program.

Surf: To skip from page to page around the Web by following links.


T

TCP/IP: Transmission Control Protocol/Internet Protocol. The protocol that drives the Internet.

Telnet. Internet protocol that allows you to log on to a remote computer and act as a dumb terminal.

Trumpet Winsock: Windows program that provides a dial-up SLIP or PPP connection to the Net.



U

UNIX: Operating system used by most service providers.

URL: Uniform Resource Locator. The addressing system for the World Wide Web.

Usenet: User's Network. A collection of networks and computer systems that exchange messages, organised by subject into Newsgroups.

W

The Web: The World Wide Web or WWW. Graphic and text documents published on the Internet that are interconnected through "clickable" hypertext links.

Web authoring: Designing and publishing Web pages.

World Wide Web: See Web, above.




Y

Yahoo: The Web's most popular directory at: http://www.yahoo.com

Z

Zip: PC file compression format that creates files with the extension .zip using PKZip or WinZip software. Commonly used to reduce file size for transfer or storage on floppy disks.

Zmodem: A file transfer protocol that, among other things, offers the advantage of being able to pick up where you left off after transmission failure.

sure I write ways to make your computer safer so lets do that 1st and then we will upgrade it even further adding a more ram a firewall line and then a better firewall then windows could ever dream of here read this :)

Malware (Spyware, Adware, Trojans, Viruses) are every increasing in their frequency, and abilities to disguise themselves. This forum is a resource for removal of these unwanted pests. Following is a guide that will help you to remove many of the most common problems, and allow us to help you most efficiently. It may look daunting, but shouldn't take long to complete.

Please remember, people are helping you for FREE. Be patient, somebody will help you as soon as they become available. We all have REAL jobs, families, have other interests, and may live half way around the world. Plus, there may be people in front of you waiting for help. Following these steps will lighten our work load, and allow us to help more members. Do not 'bump' your topic. We work older topics first. If it's been three days without a reply, create a new topic in our special waiting room (must be logged in to view).

The reality is that Hijack This logs are getting more complicated, require more time to analyze, and the infections are more difficult to remove -- often requiring a multi-step process. Anything that you can do to help us before posting a log is greatly appreciated. Please acknowledge that you've followed these required steps (or our first reply will likely direct you here).

Finally, please follow your thread to a conclusion. Helpers like to know your issue is resolved, and they will post a "your clean" speech with instructions and advice on preventing future infections. If you fail to conclude the thread, your system may not be completely clean, and it may be vulnerable to future infections.


Preparation: These initial steps will remove temporary files and make the malware scans that follow run faster.

ATF Cleaner -

Download :

http://www.atribune.org/ccount/click.php...


1. Double-click ATF-Cleaner.exe to run the program.
2. Under Main choose: Select All
3. Click the Empty Selected button.
1. If you use Firefox browser
* Click Firefox at the top and choose: Select All
* Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
2. If you use Opera browser
* Click Opera at the top and choose: Select All
* Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.

Click Exit on the Main menu to close the program.


System Restore (Windows XP and ME only)
Create a new System Restore point, and flush old.

1. Create a New System Restore Point:
1. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click System Restore.
2. On the Welcome page, click Create a restore point.
3. On the Create a Restore Point page, enter a descriptive name for your restore point, and then click Create.
2. Flush All Previous System Restore Points:
1. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup.
2. Click the More Options tab, and then under System Restore, click Clean up.
3. Click Yes to remove all but the most recent restore point. Click OK, click Yes to proceed with this action, and then click OK.

If you have anything disabled by MSConfig or any other startup manager, please re-enable them before running any scans


Spybot - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behaviour to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies. If you see new toolbars in your Internet Explorer that you haven't intentionally installed, if your browser crashes inexplicably, or if your home page has been "hijacked" (or changed without your knowledge), your computer is most probably infected with spyware. Even if you don't see the symptoms, your computer may be infected, because more and more spyware is emerging. Spybot-S&D is free, so there's no harm giving it a try to see if something has invaded your computer.

Download :::

http://dw.com.com/redir?edId=3&siteI...1...

The file you have downloaded will be named spybotsd15.exe or similar. To install Spybot-S&D, all you have to do is run the file, and the installation program will start (if you have downloaded with Internet Explorer, the download dialog will give you the option to open the file directly). The installer will show you the license and ask you for the installation location. You can go with the default settings here and just click your way through the installer by using the Next button.

After the installation has finished, you will see a Spybot - Search & Destroy button on your desktop and in your start menu. Click on it to start Spybot-S&D the first time.

The first time you start Spybot-S&D, it will display a Wizard, a small window helping you through the first steps. It gives you the possibility to add or remove the icons you have or haven't created during install, for example. Let's just say you want them and proceed to the next page.

If you are using a proxy in Internet Explorer, Spybot-S&D will show you this proxy and a button will give you the opportunity to use it for Spybot-S&D, too. If the text field is blank, you don't need to do it, but in most cases this will show an internet address, and you should import this proxy setting.

The next page deals with updates. It is very important to keep up-to-date. Using the two buttons this page offers will do the updates for you, if you want to do it at a later point, read this.

The last page of the wizard will ask you to read the help file. The help file is always a good resource if you are unsure what to do, so please do at least read the first pages of it.

After the tutorial has finished, you may find yourself on the Settings or Update page. As the default settings are ok right now, and you've already updated, let's ignore them for now and do the first scan.

The left side of the program has a navigation bar that can lead you to all functions of the program. The first section there (the top-most button) is labeled Spybot-S&D and leads you to the main page. Right now, you will see only an empty list and a toolbar at the bottom. The first button in this toolbar is named Check for problems - that is the button you've got to press to start the scanning. Lean back and watch the scan progress.

At this point, you could just jump to point 7, and remove the results. Instead we recommend that you first have a look at what all the stuff is that Spybot-S&D detected. The first thing you should know is to distinguish between the red entries, which represent spyware and similar threats, and the green entries, which are usage tracks.

For the usage tracks (I hope you have followed that link to read what they are), removal is non-critical, but depends on your personal preferences.

Ignoring the usage tracks for now, you should have a look at the red entries which represent the real threats. While you of course can trust us that we have chosen the targets using strict criteria, you can check for yourself if you click on each product and read the product information that will be shown in a pop-up window.

All problems displayed in red are regarded as real threats and should be dealt with. But while you read the product description, you may still decide to keep a threat, or just a usage track. Maybe you don't want your list of most recently used Word documents removed? At this point you have three options.

* You could decide on ignoring all usage tracks. In that case you could open the File sets page on the Settings section of the program, and disable the Usage tracks entries.
* Or if you want to just keep all tracks from a specific product, just right-click a product in the results list.
* Finally, if you want to keep just one file, that is possible the same way.


So now you should know about everything you've found. It's time to use the Fix selected problems button.

Once you start thinking about removing the usage tracks, too, you may think that ticking all the green entries is hard work. This is for a simple reason - to force you, the newbie - to look at the results. Once you know what you are dealing with, there is a hidden Select all button available for you.

Even the best antispyware programs are only able to remove about 70% of infections. Also, the line between spyware and trojans is getting blurred. To getting a deeper look at what is hiding on your system run the following online virus scan and post the results in your topic.

Online - Panda Activescan.

http://www.pandasoftware.com/activescan/

1. Once you are on the Panda site click the Scan your PC button
2. A new window will open...click the Check Now button
3. Enter your Country
4. Enter your State/Province
5. Enter your e-mail address and click send
6. Select either Home User or Company
7. Click the big Scan Now button
8. If it wants to install an ActiveX component allow it
9. It will start downloading the files it requires for the scan (Note: It may take a couple of minutes)
10. When download is complete, click on My Computer to start the scan
11. When the scan completes, if anything malicious is detected, click the See Report button, then Save Report and save it to a convenient location. Post the contents of the ActiveScan report if you start a topic for assistance.

If you don't have any antivirus software on your system, or if your subscription to definition updates has lapsed, we recommend AVG's very good free version of antivirus. This comprehensive package includes real-time protection, scheduled scans, automatic definition updates, and email scanning. More free antivirus tools here. DO NOT install more than one antivirus program. They will conflict, and provide less protection, not more. Uninstall any existing antivirus programs if you're going to install AVG.

Download :

http://dw.com.com/redir?edId=3&siteI...9...

Firewall :

ZoneAlarm Firewall (Windows 2000/XP) 7.0.362

ZoneAlarm is designed to protect your DSL- or cable-connected PC from hackers. This program includes four interlocking security services: a firewall, an application control, an Internet lock, and Zones. The firewall controls the door to your computer and allows only traffic you understand and initiate. The Internet lock blocks Internet traffic while your computer is unattended or while you're not using the Internet, and it can be activated automatically with your computer's screensaver or after a set period of inactivity. Zones monitor all activity on your computer and alert you when a new application attempts to access the Internet. Version 7.0.362 may include unspecified updates, enhancements, or bug fixes.

Note:ZoneAlarm is free for individual and not-for-profit charitable entity use (excluding governmental entities and educational institutions). Advanced features are available.

Download :

http://dw.com.com/redir?edId=3&siteI...0...

This blog maybe what you need. Please check it out. Good luck.

YuFFie> SO U HACKING ME THEN HUH
YuFFie> WElL I GOT NEWS FOR U MISTER I GOT MORE FIREWALL POWERS NOW SO IM SECURE AND IM USING WINDOWS 98 SO IM REALLY SECURE FROM HACKERS LIKE YOU SO YOU BETTA JUST GIVE UP CUZ U GOT NO HOPE MISTER.
* YuFFie (~mirc@3B942731.dsl.stlsmo.swbell.net) Quit (Quit: Owned.)
* YuFFie (~mirc@3B942731.dsl.stlsmo.swbell.net) has joined #
YuFFie> HELP MY MOUSE IS MOVING BY IT SELF

<me>you</me>

not really sure if I not how, I can wear a pocket protector, and talk about my hard drive being upgrade to an over drive processer, after I stuck in a larger power source
How was that?

come on lets go see star trek and play tennis in the backyard when its over



The answer content post by the user, if contains the copyright content please contact us, we will immediately remove it.
Copyright © 2007 enter-qa.com -   Contact us

Entertainment Categories