Black People : what r robots and what r they doing here ?????

Discussion in 'Black People Open Forum' started by jamesfrmphilly, Feb 2, 2019.

  1. jamesfrmphilly

    jamesfrmphilly going above and beyond PREMIUM MEMBER

    Country:
    United States
    Joined:
    Jun 18, 2004
    Messages:
    36,114
    Likes Received:
    11,984
    Gender:
    Male
    Occupation:
    retired computer geek
    Location:
    north philly ghetto
    Ratings:
    +15,221
    :10500:any body ?????
     
  2. jamesfrmphilly

    jamesfrmphilly going above and beyond PREMIUM MEMBER

    Country:
    United States
    Joined:
    Jun 18, 2004
    Messages:
    36,114
    Likes Received:
    11,984
    Gender:
    Male
    Occupation:
    retired computer geek
    Location:
    north philly ghetto
    Ratings:
    +15,221
  3. Hermetic

    Hermetic Well-Known Member MEMBER

    Country:
    United States
    Joined:
    May 30, 2015
    Messages:
    533
    Likes Received:
    149
    Gender:
    Male
    Ratings:
    +622
    Advertisement bots are a problem many websites have. Many of them are created to scam people or to troll a site. Also used as a means to block traffic to a site by overloading that with DDoS attacks.
     
    • True True x 1
    • Thank You Thank You x 1
    • List
  4. jamesfrmphilly

    jamesfrmphilly going above and beyond PREMIUM MEMBER

    Country:
    United States
    Joined:
    Jun 18, 2004
    Messages:
    36,114
    Likes Received:
    11,984
    Gender:
    Male
    Occupation:
    retired computer geek
    Location:
    north philly ghetto
    Ratings:
    +15,221
    they are now saying that the opposition to harris is due to bots......
     
  5. Kemetstry

    Kemetstry going above and beyond PREMIUM MEMBER

    Country:
    United States
    Joined:
    Feb 19, 2001
    Messages:
    25,750
    Likes Received:
    6,751
    Gender:
    Male
    Occupation:
    Chemist
    Location:
    Detroit
    Ratings:
    +8,797

    Harris, Warren and Booker have suffered BOT attacks. Thus far, they have been thwarted



    .
     
  6. jamesfrmphilly

    jamesfrmphilly going above and beyond PREMIUM MEMBER

    Country:
    United States
    Joined:
    Jun 18, 2004
    Messages:
    36,114
    Likes Received:
    11,984
    Gender:
    Male
    Occupation:
    retired computer geek
    Location:
    north philly ghetto
    Ratings:
    +15,221
    :10500:but what are robots ??????
     
  7. Ndugu

    Ndugu Well-Known Member MEMBER

    Country:
    United States
    Joined:
    Nov 18, 2016
    Messages:
    125
    Likes Received:
    48
    Gender:
    Male
    Ratings:
    +98
    • Like Like x 1
    • Agree Agree x 1
    • List
  8. ogoun

    ogoun Well-Known Member MEMBER

    Country:
    United States
    Joined:
    Jun 14, 2018
    Messages:
    540
    Likes Received:
    247
    Gender:
    Male
    Ratings:
    +650
  9. jamesfrmphilly

    jamesfrmphilly going above and beyond PREMIUM MEMBER

    Country:
    United States
    Joined:
    Jun 18, 2004
    Messages:
    36,114
    Likes Received:
    11,984
    Gender:
    Male
    Occupation:
    retired computer geek
    Location:
    north philly ghetto
    Ratings:
    +15,221
  10. Symbol of America

    Symbol of America going above and beyond PREMIUM MEMBER

    Country:
    United States
    Joined:
    Oct 1, 2017
    Messages:
    2,041
    Likes Received:
    354
    Gender:
    Male
    Occupation:
    RET: EMS & TPD
    Location:
    East America
    Ratings:
    +1,172
    I guess we're not talking "Robbie The Robot" here.

    https://searchsecurity.techtarget.com/definition/malware

    What is malware (malicious software)? - Definition from WhatIs.com

    Malware is software that is harmful to users or their computing systems. Find out about the different kinds of malware and what they can do.
    searchsecurity.techtarget.com


    https://en.wikipedia.org/wiki/Malware
    Malware - Wikipedia
    en.wikipedia.org


    https://searchitchannel.techtarget.com/feature/Bot-and-botnet-101

    Bot and botnet 101

    Learn the basics of bots and botnets and how they can be used as spyware.
    searchitchannel.techtarget.com


    https://en.wikipedia.org/wiki/Botnet
    Botnet - Wikipedia
    en.wikipedia.org


    https://en.wikipedia.org/wiki/Internet_bot
    Internet bot - Wikipedia
    en.wikipedia.org


    https://www.digitalattackmap.com/understanding-ddos/

    Digital Attack Map

    A live data visualization of DDoS attacks around the globe
    digitalattackmap.com


    https://en.wikipedia.org/wiki/Denial_of_service_attack
    Denial-of-service attack - Wikipedia
    en.wikipedia.org


    www.whatarecookies.com/

    https://en.wikipedia.org/wiki/HTTP_cookie
    HTTP cookie - Wikipedia
    en.wikipedia.org


    https://searchsecurity.techtarget.com/definition/adware

    What is adware? - Definition from WhatIs.com

    This definition explains the meaning of adware and how advertising-supported programs can be either helpful to users or invasive toward privacy.
    searchsecurity.techtarget.com


    https://en.wikipedia.org/wiki/Adware
    Adware - Wikipedia
    en.wikipedia.org


    https://www.britannica.com/technology/computer-virus

    Computer virus

    Computer virus: Computer virus, a portion of a program code that has been designed to furtively copy itself into other such codes or computer files. It is usually created by a prankster or vandal to effect a nonutilitarian result or to destroy...
    britannica.com


    https://en.wikipedia.org/wiki/Computer_virus
    Computer virus - Wikipedia
    en.wikipedia.org


    https://searchsecurity.techtarget.com/definition/brute-force-cracking

    What is brute force attack? - Definition from WhatIs.com

    This definition explains brute force attack, which is a method used by application programs to crack encrypted data, such as passwords or Data Encryption Standard (DES) keys, through exhaustive eff...
    searchsecurity.techtarget.com


    https://en.wikipedia.org/wiki/Brute-force_attack
    Brute-force attack - Wikipedia
    en.wikipedia.org


    https://www.scientificamerican.com/article/how-do-computer-hackers-g/

    How do computer hackers "get inside" a computer?

    Scientific American is the essential guide to the most awe-inspiring advances in science and technology, explaining how they change our understanding of the world and shape our lives.
    scientificamerican.com


    https://en.wikipedia.org/wiki/Security_hacker
    Security hacker - Wikipedia
    en.wikipedia.org


    https://its.uiowa.edu/support/article/3963
    My Computer has been Disabled because it is Compromised | Information Technology Services
    its.uiowa.edu


    https://en.wikipedia.org/wiki/Computer_security

    https://www.techopedia.com/definition/4313/monitoring-software

    What is Monitoring Software? - Definition from Techopedia

    Monitoring Software Definition - Monitoring software observes and tracks the operations and activities of users, applications and network services on...
    techopedia.com


    https://en.wikipedia.org/wiki/Tracking_software
    Tracking software - Wikipedia
    en.wikipedia.org


    https://en.wikipedia.org/wiki/Employee_monitoring_software
    Employee monitoring software - Wikipedia
    en.wikipedia.org


    https://en.wikipedia.org/wiki/Computer_and_network_surveillance
    Computer and network surveillance - Wikipedia
    en.wikipedia.org


    https://spreadprivacy.com/how-to-encrypt-devices/

    How to Encrypt Your Devices

    How to encrypt your Mac, Windows PC, iPhone and Android, to keep your data and privacy safe.
    spreadprivacy.com


    https://en.wikipedia.org/wiki/Database_encryption
    Database encryption - Wikipedia
    en.wikipedia.org










    bot-traffic.jpg

    what-does-malware-do.png

    Zenedge-Copyright-DDoS-Attacks-711x400.png

    malware.jpg

    workstation-security.jpg

    Enjoy.
     
Loading...