textual harassment


Using a mobile phone to repeatedly send unsolicited text messages to another person. The text messages may be a form of sexual harassment, abuse or bullying via text. Victims of textual harassment can request their cellphone provider to block texts (and calls) coming from a specific number, but with the capability to text from computer, the perpetrator could still send harassing text messages to the victim’s mobile phone.

Read Also:

  • OpenStack

    A project originally started by NASA and Rackspace for delivering a cloud computing and storage platform. Today, OpenStack is a global collaboration of developers and technologists producing an open source cloud computing platform for public and private clouds. The technology consists of a series of interrelated projects delivering various components for a cloud infrastructure solution. […]

  • Chromium

    Chromium refers to a pair of open-source projects that power the Google Chrome Web browser and Google Chrome OS. The Chromium project’s mission is to build an interface for users to experience the Web in a way that’s “faster, safer, and more stable than existing alternatives.” The Chromium OS project, on the other hand, aims […]

  • Chromium OS

    Chromium and Chromium OS refer to a pair of open-source projects that power the Google Chrome Web browser and Google Chrome OS, respectively. The Chromium OS project aims to develop a Web-focused operating system and computing experience that’s “fast, simple and secure,” while the Chromium project’s mission is to build an interface for users to […]

  • Cat-6 (Category 6) Network Cabling

    Short for Category 6, Cat-6 network cabling is used as the cabling infrastructure for 10BASE-T (Ethernet), 100BASE-TX (Fast Ethernet), 1000BASE-T (Gigabit Ethernet, or GbE) and 10GBASE-T (10-Gigabit Ethernet, or 10 GbE) networks. The Cat 6 standard provides performance of up to 250 MHz (500 MHz for the newer Cat 6a standard) and can be used […]

  • Next Generation Firewall

    A class of firewalls designed to filter network and Internet traffic based upon the applications or traffic types using specific ports. The application-specific granular security policies provided by Next Generation Firewalls help them detect application-specific attacks, giving them the potential to catch more malicious activity than more traditional firewalls. Next Generation Firewalls (NGFWs) blend the […]


Disclaimer: textual harassment definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.