What does PWNED mean?

Nobody wants to be PWNED. But what does this mean and why should you pay attention to it if you hear it concerns you.

pwned, owned, hack

In computer science there are strange terminologies. In fact, some of them in their Greek performance surpass all imagination. But there are also some English terms that cannot be translated into Greek, because they are simply slang. One such is the word PWNED. Although it first appeared in Warcraft, ο όρος αυτός στο δια it has a very specific meaning now. And, it's not for good.

What is PWNED?
According to the Urban Dictionary, PWNED is a "corruption" of the English word "OWNED" (meaning it belongs) and existed in the first online Warcraft game. It was the result of a map designer of the game, who mistyped the word "owned". When the computer beat a player it was supposed to say "so-and-so, has been owned". Instead he said "so-and-so, has been pwned".

Besides, the letters o and p are next to the keyboard. Do not be surprised by the language of the Warcraft game. Almost all video games have their own terminology and slang, which if you listen to it you will think that they speak passwords so that you do not understand what they are saying.

So the origin of the word "PWNED" is from the culture of video games, which soon made this mistake widely known (viral in English). In gamer slang it is a misspelling of "owned" which meant that a person is completely dominated by an opponent.

pwned

In recent years, PWNED means that some of your personal data online has been compromised. This secondary definition comes from hackers and the programming community, who used the misspelled word to describe the acquisition of unauthorized someone else's computer or if you want, its complete conquest.

In recent years, you may have heard of the site Have I Been Pwned or “HIBP”. It serves as an amazing resource for them online to check if there are data breaches in . Additionally, visitors can sign up with their email to receive alerts whenever a new breach occurs.

Created in 2013 by cybersecurity researcher Troy Hunt, it looks at data breaches without cost or registration. Visitors to the site can check if their email or phone number is part of a current or historical breach. If they have been violated you will see a list of the data type that was violated.

In addition to email and phone numbers, this may include dates of birth, gender, geographical locations, IP addresses, names, passwords, social media profiles, user site URLs, usernames, and more. HIBP also lists the date of the breach, when it was added to its website, and the number of accounts breached for each data breach.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.083 registrants.
pwned, owned, hack

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).