Black Fax
A black fax is a prank fax transmission consisting of one or more pages entirely filled with a uniform black tone. The sender's intention is generally to use up as much of the recipient's fax ink, toner, or thermal paper as possible, thus costing the recipient money, as well as denying the recipient use of their own machine (similar to computer-based denial of service In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ... attacks). This is made easier because fax transmission protocols compress the solid black image very well, so a very short fax call can produce many pages. Use Black faxes have been used to harass large institutions or government departments, to retaliate against the senders of junk faxes, or merely as simple pranks. The basic principle of a black fax can be ex ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Prank
A practical joke or prank is a trick played on people, generally causing the victim to experience embarrassment, perplexity, confusion, or discomfort.Marsh, Moira. 2015. ''Practically Joking''. Logan: Utah State University Press. The perpetrator of a practical joke is called a "practical joker" or "prankster". Other terms for practical jokes include gag, rib, jape, or shenanigan. Some countries in western nations make it tradition to carry out pranks on April Fools' Day and Mischief Night. Purpose Practical jokes differ from confidence tricks or hoaxes in that the victim finds out, or is let in on the joke, rather than being talked into handing over money or other valuables. Practical jokes are generally lighthearted and without lasting effect; they aim to make the victim feel humbled or foolish, but not victimized or humiliated. Thus most practical jokes are affectionate gestures of humour and designed to encourage laughter. However, practical jokes performed with cruelty ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Toner (printing)
Toner is a Powder (substance), powder mixture used in laser printers and photocopiers to form the text and images on paper, in general through a toner cartridge. Mostly granulated plastic, early mixtures added only carbon powder and iron oxide; now there are mixtures that contain polypropylene, fumed silica, and various minerals for triboelectrification. Toner using plant-derived plastic also exists as an alternative to petroleum plastic. Toner particles are melted by the heat of the Laser Printer#Fusing, fuser, and are thus bonded to the paper. In earlier photocopiers, this low-cost carbon toner was poured by the user from a bottle into a reservoir in the machine. Later copiers, and laser printers from the first 1984 Hewlett-Packard LaserJet#1980s, Hewlett-Packard LaserJet, feed directly from a sealed toner cartridge. Laser toner cartridges for use in color copiers and printers come in sets of cyan, magenta, yellow and black (CMYK), allowing a very large Gamut, color gamut to b ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Thermal Paper
Thermal paper (often supplied in roll form, and sometimes referred to as an audit roll) is a special fine paper that is coated with a material formulated to change color locally when exposed to heat. It is used in thermal printers, particularly in inexpensive devices, such as adding machines, cash registers, credit card terminals and small, lightweight portable printers. The surface of the paper is coated with a substance which changes color when heated above a certain temperature. The printer essentially consists of a transport mechanism which drags the paper across a thermal dot matrix print head. The (very small) dots of the head heat up very quickly to imprint a dot, then cool equally quickly. Most thermal papers' coatings turn black when heated, but coatings that turn blue or red, and multicolor coatings, are sometimes used. An unintended heat source, such as a coffee cup, can discolour the paper and obscure any printing. A fingernail rubbed quickly across the paper may g ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Denial Of Service
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. The range of attacks varies widely, spanning from inundating a server with millions of requests to slow its performance, overwhelming a server with a substantial amount of invalid data, to submitting requests with an illegitimate IP address. In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. More sophisticated strategies are required to mitigate this type of attack; simply attempting to block a single source is insuffic ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Junk Fax
Junk faxes are a form of telemarketing where unsolicited advertisements are sent via fax transmission. Junk faxes are the faxed equivalent of spam or junk mail. Proponents of this advertising medium often use the terms ''broadcast fax'' or ''fax advertising'' to avoid the negative connotation of the term ''junk fax''. Junk faxes are generally considered to be a nuisance since they waste toner, ink and paper in fax machines. History Junk faxing came into widespread use in the late 1980s as a result of the development and proliferation of relatively inexpensive desktop fax machines which resulted in rapid growth in the number of fax machines in the U.S. The invention of the computer-based fax board in 1985 by Dr. Hank Magnuski, provided an efficient platform for reaching those fax machines with minimal cost and effort. The fax machines of this period typically used expensive thermal paper and a common complaint about junk faxes was that they consumed that expensive paper without ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Fax Server
A fax server is a system installed in a local area network (LAN) server that allows computer users whose computers are attached to the LAN to send and receive fax messages. Alternatively, the term ''fax server'' is sometimes used to describe a program that enables a computer to send and receive fax messages, set of software running on a server computer which is equipped with one or more fax-capable modems (or dedicated fax boards) attached to telephone lines or, more recently, software modem emulators which use T.38 ("Fax over IP") technology to transmit the signal over an IP network. Its function is to accept documents from users, convert them into faxes, and transmit them, as well as to receive fax calls and either store the incoming documents or pass them on to users. Users may communicate with the server in several ways, through either a local network or the Internet. In a big organization with heavy fax traffic, the computer hosting the fax server may be dedicated to that f ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Lace Card
A lace card (also called a whoopee card, ventilator card, flyswatter card, or IBM doily) is a punched card with all holes punched. They were mainly used as practical jokes to cause disruption in card readers. Card readers tended to jam when a lace card was inserted, as the resulting card had insufficient structural integrity to avoid buckling inside the mechanism. Card punchers could also jam trying to produce cards with all holes punched, owing to power-supply problems. When a lace card was fed through the reader, a card knife or card saw (a flat tool used with punched card readers and card punches) was needed to clear the jam. See also * Black fax * Christmas tree packet * Denial of service * List of practical joke topics This is a list of practical joke topics (also known as a prank, gag, jape, or shenanigan) which are mischievous tricks or jokes played on someone, typically causing the victim to experience embarrassment, perplexity, confusion, or discomfort. Pr ... Note ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Zip Bomb
In computing, a zip bomb, also known as a decompression bomb or zip of death (ZOD), is a malicious archive file designed to crash or render useless the program or system reading it. The older the system or program, the less likely it is that the zip bomb will be detected. It is often employed to disable antivirus software, in order to create an opening for more traditional malware. A zip bomb allows a program to function normally, but, instead of hijacking the program's operation, it creates an archive that requires an excessive amount of time, disk space, computational power, or memory to unpack. Most modern antivirus programs can detect zip bombs and prevent the user from extracting anything from it. Details and use A zip bomb is usually a small file for ease of transport and to avoid suspicion. However, when the file is unpacked, its contents are more than the system can handle. A famous example of a zip bomb is titled ''42.zip'', which is a zip file of unknown authorship ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Denial-of-service Attack
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. The range of attacks varies widely, spanning from inundating a server with millions of requests to slow its performance, overwhelming a server with a substantial amount of invalid data, to submitting requests with an illegitimate IP address. In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. More sophisticated strategies are required to mitigate this type of attack; simply attempting to block a single source is insuffic ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
List Of Practical Joke Topics
This is a list of practical joke topics (also known as a prank, gag, jape, or shenanigan) which are mischievous tricks or jokes played on someone, typically causing the victim to experience embarrassment, perplexity, confusion, or discomfort. Practical jokes differ from confidence tricks or hoaxes in that the victim finds out, or is let in on the joke, rather than being fooled into handing over money or other valuables. Practical jokes or pranks are generally lighthearted, reversible and non-permanent, and aim to make the victim feel foolish or victimised to a degree, but may also involve cruelty and become a form of bullying if performed without appropriate finesse. Practical jokes 0–9 * 2004 Harvard–Yale prank A * Alhokm Baad Almozawla * April Fools' Day * List of April Fools' Day jokes B * Berners Street hoax * Bingo Shooting Device * Black fax C * Caltech–MIT rivalry * ''Candid Camera'' * Capping stunt * Josiah S. Carberry * Chewing gum bug * Chinese finger trap ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Billion Laughs Attack
In computer security, a billion laughs attack is a type of denial-of-service (DoS) attack which is aimed at parsers of XML documents. It is also referred to as an XML bomb or as an exponential entity expansion attack. Details The example attack consists of defining 10 entities, each defined as consisting of 10 of the previous entity, with the document consisting of a single instance of the largest entity, which expands to one billion copies of the first entity. Versions with larger amount of entries also exist. In the most frequently cited example, the first entity is the string " lol", hence the name "billion laughs". At the time this vulnerability was first reported, the computer memory used by a billion instances of the string "lol" would likely exceed that available to the process parsing the XML. While the original form of the attack was aimed specifically at XML parsers, the term may be applicable to similar subjects as well. The problem was first reported as early as 2 ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Practical Jokes
A practical joke or prank is a trick played on people, generally causing the victim to experience embarrassment, perplexity, confusion, or discomfort.Marsh, Moira. 2015. ''Practically Joking''. Logan: Utah State University Press. The perpetrator of a practical joke is called a "practical joker" or "prankster". Other terms for practical jokes include gag, rib, jape, or shenanigan. Some countries in western nations make it tradition to carry out pranks on April Fools' Day and Mischief Night. Purpose Practical jokes differ from confidence tricks or hoaxes in that the victim finds out, or is let in on the joke, rather than being talked into handing over money or other valuables. Practical jokes are generally lighthearted and without lasting effect; they aim to make the victim feel humbled or foolish, but not victimized or humiliated. Thus most practical jokes are affectionate gestures of humour and designed to encourage laughter. However, practical jokes performed with cruelty ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |