Posts

Showing posts from December, 2019

Making a no name folder in windows

Making or choosing a folder, right click, clicking rename and then: ALT key + 0160 numerically (num keys, at the right side of keyboard, pressing num lock might be needed)

Much more securely typing an internet site password and more secure login on the smartphone

Much more securely typing an internet site password and more secure login on the smartphone. The last typed letter, number or character will be visable on the screen, unfortunately. -Which is actually a vurnability. It could be viewed by hackers or with desktop viewer like  script programs. Going to the site, then going to the login and then turning OFF the 4G, 5G internet or WIFI, then typing the password and then after typing the password turning on the internet or WIFI again and then logging in is much more secure. Warning: Use at own risk. And this is more for when really needed actually, or just as an extra safety precaution. -For example if you have friends which are hackers -When in bad situations -Or when being very well known

List of cummon malware types

Virus Worm Trojan Ransomware Adware Spyware File-less malware The hybrid attack

List of cummon virii, computer virus types

Resident Virus Multipartite Virus Direct Action Virus Overwrite Virus Web Scripting Virus Boot Sector Virus Macro Virus Directory Virus Polymorphic Virus File Infector Virus Encrypted Virus Companion Virus Network Virus Nonresident Virus Stealth Virus Spacefiller Virus FAT Virus Browser Hijacker virus Sparse Infector

Filming an hack attack externally

Using an external filming device to film a hack attack. Or a hijacking. -When using the inbuild camera of a phone, it's important that the phone is at that moment not  connected to the internet. Extra for when having enough knowledge: Knowledge about taskmaneger and command, netstat is very important. Or even better knowledge or specialised software. -Danger: Sometimes they might try and destroy the computer because of opening command and                using commands.                Though some or even most hackings and hijackings are automated. And it's best to put the videos on a laptop or computer not connected to the internet and then storing it on a for example very cheap but durable data storage device. Double proof is better.

Other words for artificial intelligence and more

Another word for artificial intelligence is machine intelligence. Also important: Development of thinking computer systems. Also important 2: Knowledge engineering. The short for artificial intelligence is AI.

Some things about artificial intelligence

Some things about artificial intelligence 1 It's always partly programmed. And it's even possible to program certain actions and or decisions for example. 2 It's hackable. You can hack the code language. 3 You can manipulate it, you can fool it and more. By Jef Koelewijn. From The Netherlands.