Obfuscating

Obfuscating
Obfuscate Ob*fus"cate, v. t. [imp. & p. p. {Obfuscated}; p. pr. & vb. n. {Obfuscating}.] 1. To darken; to obscure; to becloud. [1913 Webster]

2. Hence: To confuse; to bewilder; to make unclear. [1913 Webster]

His head, like a smokejack, the funnel unswept, and the ideas whirling round and round about in it, all obfuscated and darkened over with fuliginous matter. --Sterne. [1913 Webster]

Clouds of passion which might obfuscate the intellects of meaner females. --Sir. W. Scott. [1913 Webster]


The Collaborative International Dictionary of English. 2000.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • obfuscating — É‘bfÉ™skeɪtɪŋ / É’b adj. confusing, perplexing; obscuring ob·fus·cate || É‘bfÊŒskeɪt / É’b v. confuse; muddle; obscure …   English contemporary dictionary

  • Obfuscated code — Obfuscated code is source or machine code that has been made difficult to understand for humans. Programmers may deliberately obfuscate code to conceal its purpose (security through obscurity) or its logic to prevent… …   Wikipedia

  • Email spam — An email box folder filled with spam messages. Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of spam that involves nearly identical messages sent to numerous recipients by email. Definitions of spam usually… …   Wikipedia

  • E-mail spam — E mail spam, also known as bulk e mail or junk e mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e mail. A common synonym for spam is unsolicited bulk e mail (UBE). Definitions of spam usually… …   Wikipedia

  • Code morphing — is one of the approaches to protect software applications from reverse engineering, analysis, modifications, and cracking used in obfuscating software. This technology protects intermediate level code such as compiled from Java and .NET languages …   Wikipedia

  • Open Data — is a philosophy and practice requiring that certain data are freely available to everyone, without restrictions from copyright, patents or other mechanisms of control. It has a similar ethos to a number of other Open movements and communities… …   Wikipedia

  • Intrusion detection system evasion techniques — are modifications made to attacks in order to prevent detection by an Intrusion Detection System (IDS). Almost all published evasion techniques modify network attacks. The 1998 paper [http://citeseer.ist.psu.edu/ptacek98insertion.html Insertion,… …   Wikipedia

  • Open data — Linking Open Data project in September 2007 …   Wikipedia

  • obfuscate — [[t]ɒ̱bfʌskeɪt[/t]] obfuscates, obfuscating, obfuscated VERB To obfuscate something means to deliberately make it seem confusing and difficult to understand. [FORMAL] [V n] They are obfuscating the issue, as only insurance companies can... There… …   English dictionary

  • Hocus-pocus — Ho cus po cus, n. [Prob. invented by jugglers in imitation of Latin. Cf. {Hoax}, {Hocus}.] 1. A term used by magicians or conjurers in pretended incantations. [1913 Webster] 2. A juggler or trickster. [Archaic] Sir T. Herbert. [1913 Webster] 3. A …   The Collaborative International Dictionary of English

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”