We are still actively working on the spam issue.

Search results

Jump to: navigation, search
  • ..." as used on /g/ and /tech/. For the more serious description, refer to [[Botnet (Computer Network)]].''</span> [[File:Google-botnet-logo.png|thumb]]
    2 KB (243 words) - 07:16, 9 May 2022
  • ...have died out and Search Engines are an expected part of the experience of the [[World Wide Web]]. ...d only accept questions rather than keywords so answers can be provided by the Search Engine. This is an ongoing process and immediately observable phenom
    9 KB (1,410 words) - 07:20, 20 February 2022
  • {{note| Try to keep this page up-to-date by updating the status of the extensions and patches.}} ...n for its high degree of customizability through add-ons and its adherence to Web standards.
    18 KB (2,719 words) - 03:23, 2 July 2023
  • ...at connect them, typically by moving the cursor over a link and depressing the mouse button. [https://www.justice.gov/atr/us-v-microsoft-courts-findings-f ...ware/ungoogled-chromium#downloads Ungoogled-Chromium] - chromium with less botnet. Not fully audited
    18 KB (2,874 words) - 19:55, 25 December 2023
  • {{delete|the "what does /g/ use" sections on pages do a better job}} ...s, and understand what everyone on /g/ or /tech/ is talking about? This is the place for you.
    3 KB (457 words) - 15:01, 6 March 2020
  • ...HCP and more. It's also common for routers to incorporate an access point, to provide wireless connectivity. Typically, home routers come with DHCP, NAT, UPnP and firewall preconfigured, to enable plug-and-play internet connectivity.
    16 KB (2,668 words) - 04:35, 12 February 2023
  • ...term for unwanted and malicious software. This extends from 1980s viruses to modern day cryptolockers and adware. ...attacks on a local network in mind. They would often make themselves known to a victim with boot errors or screen takeovers.
    4 KB (672 words) - 04:34, 23 January 2020
  • ...t mess. There has been a recent effort by PHP contributors and evangelists to 'fix' PHP's reputation. ...a custom implementation that converted PHP to C. Has made an active effort to move away from PHP
    7 KB (1,123 words) - 16:24, 16 December 2019
  • ...it is considered to be "value-free" and thus permitting of both reference to open source software and closed source software, for-profit and not-for-pro ...to download and install a lot of popular software via a single command on the command line, instead of
    52 KB (8,062 words) - 18:42, 9 June 2023
  • ...ny to be exactly what you want it to be, minus the time spent to learn how to personalize it. *Advanced [[Compact Disc | CD]] ripping (even if THE application recommended for this is [http://www.exactaudiocopy.de/ Exact Au
    6 KB (899 words) - 15:48, 6 January 2017
  • ...ooking for information about "e-readers" which use LCD/OLED screens, go to the article about [[tablets]]. [[File:Ereader_selection_guide.png|thumb|<s>/g/uide to ebook readers</s> (New graphic coming soon)]]
    20 KB (3,011 words) - 03:19, 16 April 2024
  • ...y.cnn.com/2016/03/02/technology/eric-schmidt-pentagon/index.html works for the pentagon] while still working for Google. *While technically it doesn't belong to Google, Android is loaded to the brim with proprietary Google applications, so for many people Android IS Go
    1 KB (208 words) - 20:32, 4 May 2020
  • ...ch of this software is also maintained by [[Pajeet|Indian Programmers]] or the Chinese. ...dule installer, xPrivacyLua, a per-app permissions-management system, just to name a few.
    23 KB (3,475 words) - 06:38, 28 November 2023
  • .... An example of this process can be seen at [[Home_Server_v2]]. Discuss on the talk page.}} ...ility redundancy and backups and serve it back to them with a /comfy/ easy to use interface.
    51 KB (8,325 words) - 19:17, 14 March 2024
  • ...truct botnet. For the term commonly seen on [[/g/]] and [[/tech/]], see [[Botnet]].'' ...oordinate their functions. They are generally controlled by a third party to execute an attack such as a [[DDOS]] or spam.
    746 bytes (124 words) - 18:24, 26 September 2016
  • ...riate responses to legitimate network traffic (e.g. a website being unable to send you it's homepage). DDOS's are considered a rather unsophisticated att ...is can be used in other ways, such as blinding network monitoring software to a real attack.
    1 KB (215 words) - 04:55, 10 May 2022
  • You have failed to use ''Common Sense'', and now your computer is infected with something call ..., not the meme [[botnet|/g/ kind]]) even if you seem to have gotten rid of the most obvious symptoms.
    2 KB (259 words) - 04:12, 23 January 2020
  • {{note|try to keep this page up-to-date by updating the status of the extensions and patches.}} ...this advantage gradually diminished in the years following its release as the other browsers caught up. Today, Chromium maintains an edge in JavaScript p
    17 KB (2,493 words) - 12:19, 23 February 2017
  • ...nux distributions, which made it extremely popular in the 1990s, and it is the oldest distribution still being maintained. ...Slackware is exceedingly easy for a more capable user to modify and tweak to suit their needs.
    14 KB (2,282 words) - 16:41, 13 February 2017
  • [[File:Windows7.png|thumb|Lube up for the botnet!]] ...cile script is a updated fork of the Aegis script, which was abandoned due to hosting issues.}}
    22 KB (3,497 words) - 09:00, 9 May 2022

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)