Zendenpen
IRC SublIM - As a platform of communication and learningIRC or Internet Relay Chat is an OPEN chat protocol which has been developed in 1988 and is still being used today.Modern variants with enhancements exist thanks to the IRCV3 specs.5 Minutes
Jan 9, 2025
LastMod: Jan 9, 2025
1005 Words
IRC SublIM - As a platform of communication and learningIRC or Internet Relay Chat is an OPEN chat protocol which has been developed in 1988 and is still being used today.Modern variants with enhancements exist thanks to the IRCV3 specs.5 Minutes
Jan 9, 2025
LastMod: Jan 9, 2025
1005 Words
ZenDenPen DevLog - UpdatesI’ve published a DevLog of ZenDenPen development news on: https://wisdom.zendenpen.com/questions/D1v2/zendenpen-development-news
1 Minutes
Jan 8, 2025
LastMod: Jan 8, 2025
10 Words
I’ve published a DevLog of ZenDenPen development news on: https://wisdom.zendenpen.com/questions/D1v2/zendenpen-development-news
ZenDenPen DevLog - UpdatesI’ve published a DevLog of ZenDenPen development news on: https://wisdom.zendenpen.com/questions/D1v2/zendenpen-development-news
1 Minutes
Jan 8, 2025
LastMod: Jan 8, 2025
10 Words
I’ve published a DevLog of ZenDenPen development news on: https://wisdom.zendenpen.com/questions/D1v2/zendenpen-development-news
The BotnetA botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
3 Minutes
Jan 6, 2025
LastMod: Jan 6, 2025
488 Words
A botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
The BotnetA botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
3 Minutes
Jan 6, 2025
LastMod: Jan 6, 2025
488 Words
A botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
Block Crawler BotsNOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
6 Minutes
Jan 3, 2025
LastMod: Jan 3, 2025
1199 Words
NOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
Block Crawler BotsNOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
6 Minutes
Jan 3, 2025
LastMod: Jan 3, 2025
1199 Words
NOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
Reclaiming the Internet One Self-Hosted Site at a TimeThe internet, once a wild frontier of boundless possibility, has become increasingly dominated by a handful of powerful corporations.
These tech giants, driven by profit and growth, have fundamentally altered the online landscape, raising concerns about data privacy, manipulation, and the very nature of online interaction. Everything is OWNED and CURATED by these corporations for profit and greed.
7 Minutes
Dec 27, 2024
LastMod: Dec 27, 2024
1393 Words
The internet, once a wild frontier of boundless possibility, has become increasingly dominated by a handful of powerful corporations. These tech giants, driven by profit and growth, have fundamentally altered the online landscape, raising concerns about data privacy, manipulation, and the very nature of online interaction. Everything is OWNED and CURATED by these corporations for profit and greed.
Reclaiming the Internet One Self-Hosted Site at a TimeThe internet, once a wild frontier of boundless possibility, has become increasingly dominated by a handful of powerful corporations.
These tech giants, driven by profit and growth, have fundamentally altered the online landscape, raising concerns about data privacy, manipulation, and the very nature of online interaction. Everything is OWNED and CURATED by these corporations for profit and greed.
7 Minutes
Dec 27, 2024
LastMod: Dec 27, 2024
1393 Words
The internet, once a wild frontier of boundless possibility, has become increasingly dominated by a handful of powerful corporations. These tech giants, driven by profit and growth, have fundamentally altered the online landscape, raising concerns about data privacy, manipulation, and the very nature of online interaction. Everything is OWNED and CURATED by these corporations for profit and greed.