This page has been robot translated, sorry for typos if any. Original content here.

FAQ on Icq terms, ICQ Terms Dictionary

ICQ client (ICQ Client) - installed on PC, PDA, Mobile phone.
Accordingly, there is a version of the implementation, for each platform and OS.

Brutus (from "brute" English) - This is the process of sorting out the specified passwords to find the right one. This requires a very powerful channel and a list of possible passwords.

Pinch (from “pinch” English) is not an ordinary virus, but a Trojan stealing passwords.

Visa (from "visible" English) - number (uin) which in the search will be visible.

Inviz (from "invisible" English) - a number that is not displayed in the search. It is considered the most reliable number of all.
INVIZ number is not to be confused with inviz status
1. There is no information except a password.
2. Not looking for a search, you can add to your contacts only by entering the number and pressing add.
2. When changing a password, it does NOT become a visa, When entering from any client, it does NOT become a visa, if you add it to your contacts or it adds to your contacts it does NOT become a visa
3. Make it visible can do any other action than those listed above.

Regger - Program for automatic registration of ICQ numbers.

Proxy (from “proxy”) is the ip-address of a remote computer / server that allows the user to maintain their anonymity while surfing the Internet.

Primary Mail (from “primary mail” English) is a postal address attached to the UIN with which you can retrieve it if the password is lost.

Secret questions-answers (Questions / Answers) - secret questions / answers necessary to recover a lost password.
After entering the correct answer, the password will be sent to any E-Mail address entered in the request form.
Installed at http://www.icq.com/password/setqa.php

Classification of ICQ numbers for beauty.

Before, all existing UINs today can be classified by the number of characters in the number:
- five signs
- six-sided
- semiznaki
- eight characters
- nine signs

In terms of prestige and importance, they are in the same order. The most prestigious are the five signs, the least - nine signs.

In each of the above groups, the further classification goes according to the beauty of the number. There is already somewhat more complicated. Highlight the main criteria:
- X numbers are when only one digit is used (for example 111111)
- XY numbers are when only two numbers are used (for example 121221)
- XYZ numbers are when only three digits are used (for example 121233)
- XYZA numbers are when only four digits are used, and the fourth digit is used only once (for example 128332)
- mirrors are when the right side is a mirror image of the left (for example, 163361)
- ladders - this is when the numbers go in a row (for example 123456)
- simple or curves numbers (for example 153478)

Inside the XY and XYZ numbers is the separation of the beauty of the masks. Here the number of options is quite large. For example: xxyyzz, xxxxyz, xyzxyz, xyyyyz, etc.

In general, in all types of rooms, the prestige is determined by the number of consecutive identical numbers (for example, 1777734). The greater their number, the better and more beautiful.

I would also like to single out the so-called elite numbers from the whole mass. These include:
- all five-digit numbers
- six-digit numbers from the first thousand (for example 100126)
- six-digit XY numbers (for example, 311111)

unreg (unregisterred) - a number that annoyed AOL corporation very much (icq owner) or just a server error. There are VERY many such numbers that cannot be registered again. Now the range is registered, if it is interesting from 359999999 to 499999999.

Dead diaposons are ranges of numbers (tens of thousands of numbers) unregistered in unreg status at all, for example, if I am not mistaken, this is the end of the range of 8 characters. Why this happened to no one knows (well, except that the gentlemen of AOL sheep ).

The icq number "invalid" is the icq number to which you can attach any number of primari soaps , why no one knows this, and when hijacking such an icq number and writing a second mailbox for recovery into the info, the owner and hijacker will retry to their e- mail addresses, if this happened to you, you can safely throw this number out or put it in public for schoolchildren and you can’t do anything with it.

Sploid (sploid) - Virus climbing into the system through web sites. Principle of operation:

1) You open the link - the sploit system is activated.
2) After analyzing the information received - View, version of the browser and possibly installed software, it issued for the request a page with a certain code that exploits the vulnerability of the browser or any software on your computer that downloaded you a trojan.
3) Next, he recorded all the data from your computer (shown here) and sent a report to the server of the Trojan owner.
4) The owner of the Trojan read (proparsil) report and replaced the passwords on mail, ICQ, etc.

Jabber , a competitor to ICQ, was born in 1998 and is supported by alternative IM services, such as Google Talk. The main difference is the decentralization of servers. The result is a very fragmented community.

Quiet Internet Pager (QIP) is a free instant messaging program using the OSCAR protocol, in many respects similar to the ICQ program. QIP is a closed source client designed for instant messaging through public servers under the Microsoft Windows operating system.

phantom contacts - contacts that were previously deleted, but for some reason remained on the server, or if you removed the brows from your list, and you do not have it, it will be a phantom contact. at the moment you can see only in the last versions of Jim.

Miranda IM (Miranda) - an instant messaging manager that can work on the most common networks, such as ICQ, AIM, MSN, Jabber, Yahoo and others. Miranda is free software, everyone can use it for free. Miranda IM is running any version of the Windows operating system. There is also a version of Miranda for Linux, although the program is not a cross-platform application and is focused on the Windows API, but its use is possible on the Wine shell, which causes some inconvenience of use for non-experienced users, but the possibility of launching it from Linux does exist.