by french frie December 3, 2006
Get the davina mug.by Psyral September 21, 2010
Get the Clamster diving mug.Related Words
daving
• daving around
• Daving Out
• Davingi Bagingi
• Double Daving
• dating
• Davin
• davina
• diving
• Daking
When two people really like each other, start hanging out with each other, and more of that kind of stuff.
by Canyoudigit November 18, 2013
Get the Dating mug.I tried to ignore her baggage and give her chance to change, but she kept going psycho on me. I hung up my cape after the last instance of hero dating.
by joshmonster August 2, 2011
Get the Hero Dating mug.A discrete place where men "Sugar Daddies" and Ladies "Sugar Babies" go to meet for mutually beneficial relationships. The website allows a discrete and safe way for people to exchange their contact details for a small price. This could include an exchange of money, services to include the occasional fancy dinner, or quickie.
Cathy needed some money for college so she visited a sugar daddy dating website. Now, she has her college paid in full, a condo, and drives a BMW.
by SugarSugar.com June 19, 2009
Get the sugar daddy dating mug.Something that has brought me back a colour palm pilot, a 17" computer screen, several thousand packs of gum, weeks worth of food, office supplies for a year, porn movies, so many chocolate boxes that we had a hard time carying back on 2 skateboards, several computer parts (USB2 cards, Video Cards, etc.), and much more.
The best places to 'dive are suburbs, after Christmas, Valentine's day, and Easter. Office stores are ALWAYS loaded.
by Scavenger December 15, 2003
Get the dumpster diving mug.Dumpster diving is looking for treasure in someone else's trash. (A dumpster is a large trash container.) In the world of information technology, dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network. Dumpster diving isn't limited to searching through the trash for obvious treasures like access codes or passwords written down on sticky notes. Seemingly innocent information like a phone list, calendar, or organizational chart can be used to assist an attacker using social engineering techniques to gain access to the network.
by Biohertz January 30, 2003
Get the dumpster diving mug.