Загрузка...
Keywords
| Word or Phrase | Description Text | Aliases |
|---|---|---|
| Remote Desktop Protocol | (RDP) is used to connect to remote desktops like virtual or dedicated servers. On Windows, it’s built-in as "Remote Desktop Connection"; on Android and iOS, via the Microsoft Remote Desktop app. | RDP, рдп, remote, remote desktop protocol |
| Mafile | This file (key) that gives almost complete access over the Steam account. It replaces account access with mob. device, which is why it is called MaFile (Mobile Authenticator File). As a rule, mafiles are used in the SDA (Steam Desktop Authenticator) program in order to accept / confirm trades, receive a mobile guard code, etc. | mafile, мафайл, маф |
| Know Your Customer | (KYC) a procedure requiring financial institutions and crypto exchanges to verify a client's identity via photos of ID documents (passport, driver’s license | KYC, кус, Know Your Customer, вериф, верификация, verification |
| Anti-Money Laundering | (AML) is a set of measures and procedures aimed at combating money laundering and terrorism financing. It is used by banks, exchanges, and other financial institutions to monitor suspicious transactions. | AML, амл, амл-проверка |
| VoIP | (Voice over Internet Protocol) or IP telephony is voice communication over the Internet (unlike traditional telephone communication, which takes place via telephone lines or a GSM/3G mobile network) | войп, Voip |
| Bruteforce | A method of guessing the use of a password (or key, for encryption), assuming a systematic enumeration of all possible combinations of characters until the correct combination is found | брут, bruteforce, брутфорс, сбрутил, брутил |
| Bug | means an error in the program or in the system, due to which the program produces unexpected behavior | баг, bug, баги, bugs |
| Feature | A feature is an error that does not violate the functionality of the program, but, on the contrary, improves or gives it some kind of “zest” | фича, фичу |
| Hashcat | Soft which help break hashes all types. This software has a different types of attack, like password selection or bruteforce | Hashcat, хешкет, хэшкет, хешкэт |
| User Interface | (UI) User interface: all buttons, signs, text input fields and other ways of user interaction with a site, application or other IT service | UI, уи, пользовательский интерфейс, user interface |
| IMEI | (International Mobile Equipment Identity) is a unique number stored in the firmware of your device and associated with the radio module. Using the IMEI, the device registers on the network. Which, for example, will allow you to make emergency calls from any mobile phone even without a SIM card. The IMEI consists of 15 digits and contains a lot of useful information, where the phone was made, what model, what serial number it has | IMEI, имэй |
| Ronin Wallet | Is a cryptocurrency wallet developed for users of the popular NFT game Axie Infinity. It is available as a mobile app and an extension for Chrome and Firefox browsers | ронин, ronin |
| Abuse | Abuse of available opportunities for the purpose of obtaining any profit | абуз, абузер, абузить, abuse, abuser |
| Hardware Identificator | The unique identifier of the device. It is most often used in various services to link an account to a user's computer or to block it "by hardware" | hwid, хвид |
| mammoth | The word "mammoth" is used by scammers in the meaning of "a person who is easily bred for money (especially gullible and naive)" | мамонт, мамонта, мамонты, мамонтов, mammoth |
| shipping | It comes from the English word shipping – delivery. In our use, the THORN has taken root in a short form. | шип, шипинг, shipping |
| Residential proxies | A proxy network consisting of real ip addresses used by real people | резидентские, residential |
| Virtual machine | A system that emulates the hardware of some platform | Виртуалка, vm, вм |
| Self-created | This concept applies to software - it is written by a private person who distributes it or puts it into free access. | Самопис, самописный |
| Svat | Dissemination of messages about a threat to society to the management of a city/country/enterprise with the participation of the victim | сват, svat, сватну, сваттинг, сватнет |
| Drainer | A phishing site luring victims to sign malicious transactions that allow an attacker to gain access to all of your cryptocurrency and NFT | дрейнер, drainer |
| public | Publicly available information that anyone can use | паблик |
| PHP | is a popular programming language, especially among web developers | php, пхп, пышка, пэхапэ, пыха |
| Safedeal | A Safedeal is a method of transferring funds to the Market balance, with temporary restrictions on their use (hold). The idea is that through this process, you can safeguard your money if your deal doesn't go as planned or if the seller/buyer simply tries to scam you. | Безопасная сделка, безопасная сделка, оплата с холдом, безопасную сделку, оплату с холдом, оплатить с холдом, безопасно сделка, safedeal |
| Support | Support, technical support service | Саппорт, сапп, support |