Search results

Jump to navigation Jump to search
  • ...complete control to your computer. He can do basically anything with your computer. ...ll keylogger and other malicious viruses remotely to your computer, infect files on your system and more.
    365 bytes (60 words) - 19:59, 21 February 2019
  • {{Template:Computer engineering}} == Kor chan DB dump files 2020-04-11 ==
    1 KB (187 words) - 22:21, 14 December 2020
  • {{Template:Computer engineering}} [[Charles Petzold]]'s "[[Code]]" is a recommended book. You can find [[pdf]] files of the book on [[Google]]. Just search "charles petzold code pdf" on Google
    535 bytes (62 words) - 12:02, 22 May 2020
  • {{selfref|For information about files on Wikipedia, see [[Help:Files]].}} {{wiktionary|file|files|filing}}
    1 KB (205 words) - 05:29, 13 November 2018
  • {{Template:Computer engineering}} ...PGP is often used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-m
    719 bytes (91 words) - 15:21, 3 May 2020
  • {{Template:Computer engineering}} ...3=Jeffrey Ullman|title=Compilers: principles, techniques, and tools|series=Computer Science|year=1986|publisher=Mark S. Dalton|isbn=0-201-10194-7|page=[https:/
    3 KB (377 words) - 11:14, 17 May 2020
  • ...omputing)]], or folder, a file system structure in which to store computer files ...ctory service]], a software application for organizing information about a computer network's users and resources
    994 bytes (126 words) - 05:27, 13 November 2018
  • ...nce it is uploaded, the hacker can use it to edit, delete, or download any files on the site, or [[upload]] their own. ...puter security)|exploit]]s or [[remote file inclusion]], or a virus on the computer
    2 KB (318 words) - 12:25, 4 February 2019
  • ...tory]] on a [[multi-user]] [[operating system]] containing [[Computer file|files]] for a given [[User (computing)|user]] of the system. The specifics of th ...] [[Internet bookmark|bookmarks]], favorite [[Desktop metaphor|desktop]] [[Computer wallpaper|wallpaper]] and [[Theme (computing)|themes]], [[password]]s to an
    5 KB (770 words) - 03:11, 16 November 2018
  • {{Template:Computer engineering}} [[Charles Petzold]]'s [[Code]] is a recommended book. You can find [[pdf]] files of the book on [[Google]]. Just search "charles petzold code pdf" on Google
    3 KB (420 words) - 23:51, 18 May 2020
  • This computer's Internet connection is free of obstacles. I would like to connect directl This computer's Internet connection is censored, filtered, or proxied. I need to configur
    3 KB (409 words) - 21:34, 15 July 2021
  • {{Template:Computer engineering}} ...a computer "to perform indicated tasks according to encoded [[instruction (computer science)|instructions]]",<ref>{{cite web |url=http://www.merriam-webster.co
    5 KB (769 words) - 11:14, 17 May 2020
  • ...관리자]] ([[file manager]])인 [[파일즈]] ([[Files]])를 실행시킨다. [[그놈 파일즈]] ([[GNOME Files]], [[놈 파일즈]])는 예전에는 [[노틸러스]] ([[Nautilus]])라는 [[파일 관리자]]인 [[GNOME Files]]를 실행시킨다. 화면 왼쪽 위쪽의 Activities 오른쪽에 있는 Files ▼를 누른 후 Preferences를 선택한다. 그리고 Search & Preview [
    4 KB (132 words) - 19:20, 19 November 2018
  • {{Template:Computer engineering}} == Where are the downloaded files stored? ==
    3 KB (491 words) - 00:38, 16 March 2021
  • ...[[file system]] cataloging structure which contains references to other [[computer file]]s, and possibly other directories. On many computers, directories are ...ry. In a [[hierarchy|hierarchical]] [[file system]] (that is, one in which files and directories are organized in a manner that resembles a [[tree structure
    8 KB (1,118 words) - 05:28, 13 November 2018
  • In [[computing]], a '''command''' is a directive to a computer program acting as an interpreter of some kind to perform a specific task. M ...y, the term ''command'' is used in [[imperative programming|imperative]] [[computer language]]s. These languages are called this, because [[statement (programm
    4 KB (573 words) - 05:05, 13 November 2018
  • {{Template:Computer engineering}} ...[[swap space]] and the [[temporary file]]s is encrypted. Encrypting these files is important, as they can reveal important confidential data. With a softwa
    3 KB (493 words) - 11:23, 18 May 2020
  • ...printing method. In Sequences II: Methods in Communications, Security, and Computer Science, pages 143--152. Springer-Verlag, 1993</ref> just as human [[finger ...king, vol. 8, No. 3 (2000)</ref><ref name="mnb">U. Manber, Finding Similar Files in a Large File System. Proceedings of the USENIX Winter Technical Conf. (1
    8 KB (1,154 words) - 01:47, 4 February 2021
  • {{Template:Computer engineering}} Analyze suspicious files and URLs to detect types of malware, automatically share them with the secu
    2 KB (242 words) - 22:00, 29 March 2020
  • {{Template:Computer engineering}} If you want to purge(uninstall and delete setting files) it, type
    1 KB (211 words) - 02:09, 24 October 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)