18 Fun Interesting Facts You Never Knew About The Internet

m (Created page with "<div align=justify>Well, it’s official. Pretty much everyone now has broadband and the majority us of use the Internet more than we watch TV. Everyone and their grandmother is ...")
 
m
 
Line 11: Line 11:
 
     :-)  
 
     :-)  
  
    was proposed by Scott Fahlman and has become the norm.
+
was proposed by Scott Fahlman and has become the norm.
  
 
'''4.''' Did you know – the Japanese also use emoticons, but theirs are the correct way up instead of on the side, and a lot cuter!
 
'''4.''' Did you know – the Japanese also use emoticons, but theirs are the correct way up instead of on the side, and a lot cuter!
    [[User:Admin|Admin]]ヾ(^∇^)
+
  ヾ(^∇^)
  
 
'''5.''' The first webcam was deployed at Cambridge University computer lab – its sole purpose to monitor a particular coffee maker and hence avoid wasted trips to an empty pot.
 
'''5.''' The first webcam was deployed at Cambridge University computer lab – its sole purpose to monitor a particular coffee maker and hence avoid wasted trips to an empty pot.
Line 43: Line 43:
  
 
'''18.''' The most common form of “cyber terrorism” is a DDOS, or Distributed Denial of Service attack, whereby hundreds if not thousands of systems around the world simultaneously and repeatedly connect to a website or network in order to tie up the server resources, often sending it crashing offline. Anonymous released a tool this year that users could download and set on autopilot to receive attack commands from a remote command source. Similar DDOS attacks are often performed by the use of malware installed on users computers without their knowledge.</div>
 
'''18.''' The most common form of “cyber terrorism” is a DDOS, or Distributed Denial of Service attack, whereby hundreds if not thousands of systems around the world simultaneously and repeatedly connect to a website or network in order to tie up the server resources, often sending it crashing offline. Anonymous released a tool this year that users could download and set on autopilot to receive attack commands from a remote command source. Similar DDOS attacks are often performed by the use of malware installed on users computers without their knowledge.</div>
 +
 +
''Taken from http://www.makeuseof.com''

Latest revision as of 07:48, 30 January 2012

rss feed for my website