so that only users of a certain hostmask or IP address can gain IRC operator status using that O-line. Using hostmasks and IP addresses in the O-line requires...
26 KB (3,609 words) - 22:09, 11 June 2024
and some websites. In [email protected], the a.b.com part is known as the "hostmask" and can either be the server being connected from or a "cloak" granted...
22 KB (739 words) - 19:41, 2 September 2024
user's nickname and ident are separated by an exclamation mark in the hostmask assigned to him or her by the server. In UNIX scripting (typically for...
58 KB (5,974 words) - 10:55, 28 October 2024
does implement reop -channelmode that allows channel operators to set hostmasks for users to be automatically "reopped" by the server. This mode is called...
5 KB (579 words) - 16:42, 13 June 2024
Star Trek: Section 31 novel Cloak and cloaking, IRC terms related to hostmasks Cloaking, a search engine optimization technique Cloaking device, a previously...
736 bytes (127 words) - 09:09, 16 June 2024
RPL_ISUPPORT reply (numeric 005) with the SETNAME keyword Syntax: SILENCE [+/-<hostmask>] Adds or removes a host mask to a server-side ignore list that prevents...
29 KB (3,470 words) - 05:49, 6 June 2024
a users folder with xml files that contain the "org.drftpd.usermanager.HostMask" string. Pre date: 2009-11-22. [5] Archived 2011-08-23 at the Wayback Machine...
37 KB (3,710 words) - 04:56, 8 June 2024
features such as removing color codes from text, or obscuring a user's hostmask ("cloaking") to protect from denial-of-service attacks. Proxy detection:...
236 KB (23,634 words) - 21:45, 16 September 2024