Browse Definitions :
Definition

MUD (Multi-User Dungeon)

A MUD or Multi-User Dungeon is an inventively structured social experience on the Internet, managed by a computer program and often involving a loosely organized context or theme, such as a rambling old castle with many rooms or a period in national history. Some MUDs are ongoing adventure games; others are educational in purpose; and others are simply social. MUDs existed prior to the World Wide Web, accessible through Telnet to a computer that hosted the MUD. Today, many MUDs can be accessed through a Web site and some are perhaps better known as "3-D worlds."

MUD participants adopt a character or avatar when they join or log in to a MUD. Typically, you can describe your avatar to the other participants. Each MUD has its own name, special character and ambience, and set of rules. MUDs are run by advanced participants or programmers called wizards.

Although many MUDs continue to be entirely text-based, some new MUDs use virtual reality settings and you can see the characters. However, the focus is on the exchange of text between participants who are logged in at a particular time. There are a number of variations on the MUD, including MOO s, MUCKs, and MUSHes, each associated with a server program of that name and varied mainly by the programming language used and the capabilities offered.

This was last updated in March 2011

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

Close