ASCII: ASCII, or American Standard Code for Information Interchange, is code that represents text. (More...)
Bandwidth: Bandwidth refers to amount of data sent and received between other computers. Bandwidth consists of uploading (sending data out to other computers) or downloading (receiving data from other computers). (More...)
Base 10: Base 10 refers to the decimal numeral system which consists of the numbers 0 to 9, and is the most widely used system of counting. (More...)
Binary: Binary is a numerical system using just two characters, 0 and 1, and is used internally by most all modern computers. (More...)
Bit: A bit, or binary digit, is a single is a single digit in binary. For example, in the equivalent in the alphabet is a letter. A bit is either a 0 or 1. (More...)
Bitwise Operation: A bitwise operation is an operation performed on bits. This is similar to how the decimal system uses operations like addition, subtraction and multiplication. The three bitwise operators discussed in this article are AND, XOR and OR. (More...)
Boolean: A boolean is a variable that represents either "True" or "False". In most languages, True = 1 and False = 0, but in Visual Basic, True = -1. Because of this, in Visual Basic, a boolean is a 2-byte variable (to store the -1). Booleans are often avoided, and bytes are used instead, because they can only support True or False, but use the same amount of memory.
Byte: A byte, or octet, consists of 8 bits, and is the smallest single-variable unit used in common programming. (More...)
Byte Array: A byte array is an array, or series, of bytes. Basically, instead of having a series of bytes b1, b2, b3... b10, where b is any variable, you just define if by b(1 to 10). In other languages, this syntax may change, but the concept is the same.
Closed Source: Closed source applications are applications that do not release their source code publicly. (More...)
Compression: To reduce the size of information, or "compress" it, to save space. The methods used to compress the file depend on the compression algorithm. (More...)
Cookie-Cutter: Refers to being identical, like the cookie shapes made from a cookie cutter. For example, cookie-cutter games are games that are the same in most every aspect, except for a few minor details.
CPU: The CPU, or processor, is the part of the computer that does the instruction processing. CPU is often referred to with "CPU usage", which is another way to say the amount of time it takes for the instructions to be computed. In other words, less CPU usage = faster. (More...)
DOS Attack: A DOS (Denial of Service) attack is an attack aimed towards making a computer's resources unavailable, such as crashing the computer or the applications on it, or preventing the computer to send/receive packets. (More...)
Encryption: Encryption is the process of obscuring information to make it unreadable without special information. Most encryption requires at least one key to decrypt the information. An invalid key would result in incorrectly decrypted information. (More...)
Engine: In games, the engine is the core or foundation of the program. The engine is basically the game, minus all the content. (More...)
First Person Shooter: A shooter game in a first-person perspective, such as Counter-Strike. (More...)
Hexadecimal: Hexidecimal is a numeric system that uses 16 digits containing 0-9 and A-F. (More...)
Indie: Indie often refers to independent. Indie games are games created by small, low-budget groups, often for small profit or for fun. (More...)
LAN: A LAN is a Local Area Network, a network that covers a small geographic area, like an office. (More...)
Latency: The packet latency (delay time) over a network. (More...)
Maple Story: Maple Story is a large, popular MMORPG, unique for its platformer view instead of typical top-down structure. It is also popular for having more hackers then most any other game due to its poor networking structure. (More...)
NPC: NPCs, or Non-Player Characters, are any characters that are not controlled by a person. (More...)
Packets: Packets are what is used to communicate between computers. Packets are nothing more then a block of information. They consist of a header, which tells the computers where the packet is going, along with a "tail" which contains all the information sent in the packet. How the "tail" information in the packet is constructed depends completely on the software sending and receiving it. (More...)
RAM: RAM, or Rapid Access Memory, is where data is stored when "in memory". Unlike the hard drive, RAM does not physically read or write information, which allows for faster retrieval, but when the power source to the RAM is lost, the RAM is cleared. Having more RAM allows you to keep more information stored in RAM for faster retrieval. (More...)
RPG: Short for Role Playing Game, RPGs are played where the user takes on characteristics of a fictional character. One of the primary parts of RPGs is that as the game progresses, the character does, too. (More...)
Socket: An internet socket is a socket used to allow computers to communicate to each other across the internet. (More...)
Speed Hack: A speed hack is a program that increases your system's internal clock speed in attempt to increase the speed at which a program operates. Most programs operate using the system's internal timer as a relative time, so altering this time will increase the speed of everything using the timer.
Visual Basic 6: Visual Basic 6 is the 6th version of the programming language Visual Basic, the language used for all the code in this article. The language is designed for fast application development, and is recognized for its and friendly syntax. (More...)