FFFF: Fueling Future Frontier Frontiers

FFFF Fueling Future Frontier Frontiers

FFFF is a vulgar slang acronym that refers to the misogynist motto, “find ’emfeel ’emfuck ’em, and forget ’em.” The ’em in this case? You guessed it: women-in-general. There are variations on FFFF, including the total number of Fs and what specifically they stand for (e.g., fool, feed, etc). It can also be a self-censoring euphemism for that classic four-letter F word.

  • FFFF, also known as the Four Fs or 4-Fs, has been around in forms since at least 1922. It is a crass, disrespectful, machomotto for treating women as disposable sex objects.
  • An early form went find ’emfeel ’emfuck ’em, and forget ’em. Specific meanings of the Fs can vary, including foolfinger, and feed, and can be added to form Five Fs.

 

  • One notable example of FFFFcomes in the 1933 film I’m No Angel, starring the legendary Mae West, who advises her maid to “find ’em, fool ’em, and forget ’em” regarding men, a subversive riff on the original. The rap group N.W.A. released the song “Findum, Fuckum, & Flee” in 1991. Entries for FFFF were added to Urban Dictionary in 2002.
  • The term came into the public spotlight in September 2018 during hearings on sexual assault allegations against Supreme Court Justice Bret Kavanaugh. His 1983 high school yearbook contained the note “FFFFFFFourth of July” next to his picture.\
  • Many thought the Fs to be a reference to the vile FFFFtreatment of women, especially based on the testimony of his chief accuser, Dr. Christine Blasey Ford. Questioned by Rhode Island Senator Sheldon Whitehouse about the Fs, Kavanaugh claimed: “One of our friends, Squee, when he said the F word starting at young age, had kind of a wind-up to the F word. Kind of a ‘FFFF’…And it became an inside joke for the…F word.” Hmmmm… (Four Ms in that, we’ll have you note)

ffff

 

WHO USES FFFF?

FFFF is a misogynistic term, implying treating women as sex objects. That doesn’t stop men from joking about–or, in certainly too many instances, carrying out–the FFFF credo. It’s something of a meat-headed boast, if you ask us, especially when men who say they live by FFFF are part of an FFFF or 4-F Club–an ironic play on the wholesome image of the 4-H Club.

 

Like this page, where he signs his letter like so many east coast kids at that time – part of the lyrics to the 4 F Club, by the band The Mentors? “Find her, Feel her… – you get the point…” Love, Kavanaugh… handwritten and all. pic.twitter.com/UExxBpe94q

 

NOTE

This is not meant to be a formal definition of FFFF like most terms we define on Dictionary.com, but is rather an informal word summary that hopefully touches upon the key aspects of the meaning and usage of FFFF that will help our users expand their word mastery.

 

Every now and then, a security team uncovers something only the Internet Engineering Task Force (IETF) can fully explain. During a review of network activity, our team noted unusual outbound web traffic from our network. Our investigation took us from checking a simple IPv6 address to researching the IETF’s Request for Comments. What we found along the way demonstrates why monitoring for anomalous IP addresses is important for every organization.

The traffic was routed to an IPv6 address containing ::ffff: followed by 32 bits. Fortunately, open-source tool CentralOps helps identify this odd IPv6 activity, even going so far as to reference the RFCs explaining the basis for the activity. As it turns out, this is an example of an IPv4-mapped IPv6 address, and its structure is shown in the following figure:

RFC 4291 notes that an IPv4-mapped IPv6 address is one of two types of IPv6 addresses with embedded IPv4 addresses. An IPv4-mapped IPv6 address is used to represent IPv4s as IPv6s. The example mentioned above is used when applications support both IPv4 and IPv6 (pictured below).

Understanding unusual IPv6 activity is not just academic. This past February, Cloudfare discovered and patched a bug associated with embedded IPv4 addresses. A researcher “was able to use DNS entries based on mapped addresses to bypass some of our [Cloudfare’s] controls and access ports on the loopback address or non-routable IPs.”

As all cybersecurity gurus say, understanding networking is essential for proper cybersecurity analysis and response. When reviewing network connections in your organization, keep an eye out for unusual or distinctive network activity. The interaction between IPv4 and IPv6 architecture protocols can lead to interesting findings.

Don’t discount the utility of open-source tools to help identify any unusual traffic on your network. The adoption of IPv6 has led to some interesting interactions between the new protocol and its predecessor, IPv4, and there are all sorts of free resources available to help you understand what’s happening in your network. CentralOps and RFCs just might have the unnoticed details that explain what you’re seeing.

Betty Gilpin: Unveiling the Talented Star’s Journey in the Spotlight

Unveiling the Layers of “Ho You Fat”

Leave a Reply

Your email address will not be published. Required fields are marked *