What does PWNED mean?

Nobody wants to be PWNED. But what does this mean and why should you pay attention to it if you hear it concerns you.

pwned, owned, hack

At there are unlikely terminologies. In fact, some of them in their Greek performance surpass all imagination. But there are also some English terms that cannot be translated into Greek, because they are simply slang. One such is the word PWNED. Although it first appeared in the game Warcraft, this internet term has a very specific meaning now. And, it's not for good.

What is PWNED?
According to the Urban Dictionary, PWNED is a "corruption" of the English word "OWNED" (meaning owned) and existed in the first online game Warcraft. It was the result of a game map designer misspelling the word "owned". When the was beating a player who was supposed to say “so-and-so, has been owned”. Instead it said "so-and-so, has been pwned".

Besides, the letters o and p are next to the keyboard. Do not be surprised by the language of the Warcraft game. Almost all video games have their own terminology and slang, which if you listen to it you will think that they speak passwords so that you do not understand what they are saying.

So the origin of the word "PWNED" is from the culture of video games, which soon made this mistake widely known (viral in English). In gamer slang it is a misspelling of "owned" which meant that a person is completely dominated by an opponent.

pwned

In recent years, PWNED has meant that some of your personal information on the Internet has been compromised. This sub-definition comes from the hackers and the programming community, who used the misspelled word to describe the unauthorized acquisition of someone else's computer or, if you will, its complete conquest.

In recent years, you may have heard of the site Have I Been Pwned or “HIBP”. It serves as an amazing resource for internet users to check if there are data breaches in personal data. In addition, visitors can sign up with their email to receive notifications whenever a new breach occurs.

Created in 2013 by cybersecurity researcher Troy Hunt, it looks at data breaches without cost or registration. Visitors to the site can check if their email or phone number is part of a current or historical breach. If they have been violated you will see a list of the data type that was violated.

In addition to email and phone numbers, this may include dates of birth, genders, geographic locations, IP addresses, names, passwords, social media profiles, user website URLs, usernames, and more. HIBP also lists the breach, when it was added to its site, and the number of accounts breached for each data breach.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
pwned, owned, hack

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).