m (Created page with "<div align=justify>Well, it’s official. Pretty much everyone now has broadband and the majority us of use the Internet more than we watch TV. Everyone and their grandmother is ...") |
m |
||
Line 11: | Line 11: | ||
:-) | :-) | ||
− | + | was proposed by Scott Fahlman and has become the norm. | |
'''4.''' Did you know – the Japanese also use emoticons, but theirs are the correct way up instead of on the side, and a lot cuter! | '''4.''' Did you know – the Japanese also use emoticons, but theirs are the correct way up instead of on the side, and a lot cuter! | ||
− | + | ヾ(^∇^) | |
'''5.''' The first webcam was deployed at Cambridge University computer lab – its sole purpose to monitor a particular coffee maker and hence avoid wasted trips to an empty pot. | '''5.''' The first webcam was deployed at Cambridge University computer lab – its sole purpose to monitor a particular coffee maker and hence avoid wasted trips to an empty pot. | ||
Line 43: | Line 43: | ||
'''18.''' The most common form of “cyber terrorism” is a DDOS, or Distributed Denial of Service attack, whereby hundreds if not thousands of systems around the world simultaneously and repeatedly connect to a website or network in order to tie up the server resources, often sending it crashing offline. Anonymous released a tool this year that users could download and set on autopilot to receive attack commands from a remote command source. Similar DDOS attacks are often performed by the use of malware installed on users computers without their knowledge.</div> | '''18.''' The most common form of “cyber terrorism” is a DDOS, or Distributed Denial of Service attack, whereby hundreds if not thousands of systems around the world simultaneously and repeatedly connect to a website or network in order to tie up the server resources, often sending it crashing offline. Anonymous released a tool this year that users could download and set on autopilot to receive attack commands from a remote command source. Similar DDOS attacks are often performed by the use of malware installed on users computers without their knowledge.</div> | ||
+ | |||
+ | ''Taken from http://www.makeuseof.com'' |