#Virtual Router
Explore tagged Tumblr posts
Link
The North American region is anticipated to hold the largest market size in the global virtual router market...
0 notes
Link
0 notes
Link
0 notes
Text
*spending the better part of my morning figuring out how to run a VPN on my router so my stupid fucking smart TV unlocks the American Exclusive Features for me so I can Airplay my laptop onto it to watch last night's Drag Race ep* I honestly don't know how I ended up as a software engineer
#anthy&tea#sidenote this is a very good skill to have if you have your own router and a VPN sub lying around. fuck you virtual geolocking :)
1 note
·
View note
Photo
Find out how Skylark can help improve your business with our comprehensive IT Infrastructure Services portfolio. We provide tailored solutions for small businesses and enterprises of all sizes.
#digitaltransformation#it infrastructure#it#sectors#softwaredefined#network#router#vendor#solution#serviceprovider#fortinet#securestorage#itserviceprovider#infrastructure#cybersecurity#threats#complexity#branch#virtual networking#broadband#cost#maintenance#skylarkinfo#skylark#sdwan
0 notes
Text
TECHNOLOGY ID PACK
NAMES ⌇ admin. ajax. alexa. am. atari. audio. auto. bailey. binary. blank. blu. blue. bluesse. browser. browsette. bug. byte. cache. calware. chip. circe. click. clicker. clickie. clicky. cloud. coda. code. codette. codie. cody. computette. crypt. cursor. cy. cyber. cybernet. cybernetica. cyberweb. cypher. cypherre. data. dell. digi. digitalia. digitelle. digitesse. disc. dot. electronica. electronique. emoticon. emoticonnie. fax. file. gig. gizmo. glitch. glitche. glitchesse. glitchette. graphique. hacker. hal. halware. hijack. index. informationne. intelligette. internette. interweb. java. javascript. juno. key. link. linuxe. lotus. lovebytes. mac. mal. malakai. malware. malwaria. memorette. memorie. meta. mic. micah. mickey. morphe. mouse. mousette. myspace. nano. neo. net. netette. nett. netty. paige. pascal. payton. peyton. pixel. programatha. programette. programme. pulse. reboot. rom. router. ruby. sam. sammy. screene. screenette. sean. shock. solitaire. spy. static. stutter. talia. tap. tecca. tech. techette. tessa. tetris. trojan. troubleshoot. ts. user. vir. virus. virusse. volt. vyrus. webbe. wheatley. whirr. widget. will. wirehead. wiresse. zap. zett. zetta. zip.
PRONOUNS ⌇ :-)/:-D. ^^/^^. ai/ai. alt/alt. anti/antivirus. arc/archive. audio/audio. bat/battery. beep/beep. beep/boop. bit/bit. bit/byte. blue/blue. board/board. bright/bright. brow/browser. browser/browser. brr/brr. bu/bug. bug/bug. buzz/buzz. byt/byte. byte/byte. c/cpu. charge/charger. cir/circuit. cli/click. click/clack. click/click. click/scroll. co/code. code/code. color/color. com/com. com/computer. comp/computer. compute/computer. computer/computer. cor/corrupt. corrupt/corrupt. CPU/CPU. crash/crash. cre/creeper. crtl/crtl. cy/cyber. cyb/cyber. cyber/cyber. da/data. data/data. delete/delete. di/disk. dig/digital. digi/digi. digi/digital. digital/digital. dra/drag. e/exe. electronic/electronic. enter/enter. er/error. err/error. error/error. exe/exe. fi/file. file/file. gi/gif. gli/glitch. glit/glitch. glitch/glitch. graphic/graphic. hac/hacker. hack/hack. hard/hardware. head/phone. hij/hijacker. ho/home. info/info. information/information. int/internet. intelligent/intelligence. intelligent/intelligent. inter/net. internet/internet. it/it. jpg/jpg. key/board. key/cap. key/key. key/keyboard. key/keylogger. lag/lag. lap/laptop. ligh/light. linux/linux. load/load. log/login. main/mainframe. mal/malware. me/media. memory/memorie. mon/monitor. mou/mouse. nano/nano. net/net. net/network. o_o/>_>. org/org. over/overwrite. page/page. pix/pix. pix/pixel. pixel/pixel. plu/plug. png/png. pop/popup. port/port. pow/power. pro/program. program/program. ram/ram. ran/ransom. reboot/reboot. reload/reload. res/restore. ret/retro. route/router. sca/scan. scr/scroll. scre/screen. scre/screencap. scree/screen. screen/screen. scri/script. script/script. sentient/sentience. shift/shift. site/site. skip/skip. soft/software. spa/spam. space/space. spy/spyware. stop/stop. te/tech. tech/nology. tech/tech. technology/technology. tou/touchpad. txt/txt. typ/type. upload/upload. user/user. vi/viru. vi/virus. vir/virtual. web/page. web/web. whir/whir. wi/wire. win/dow. win/window. wire/wire. wire/wired. zip/zip . ⌨ . ☣ . ⚙ . ⚠ . 🎞 . 🎨 . 🎭 . 🎮 . 🎵 . 👀 . 👁 . 💔 . 💡 . 💢 . 💣 . 💳 . 💵 . 💻 . 💽 . 💾 . 💿 . 📀 . 📱 . 🔇 . 🔈 . 🔉 . 🔊 . 🔋 . 🔌 . 🔎 . 🖥 . 🖱 . 🗡 . 🗯 . 🛠 . 🧿 .
#⭐️lists#id pack#npt#name suggestions#name ideas#name list#pronoun suggestions#pronoun ideas#pronoun list#neopronouns#nounself#emojiself#techkin#robotkin#internetkin
320 notes
·
View notes
Text
𓎟 ̊ names and prns relating to the internet, cyberspace, and technology𓈒
requested by anon
Zett﹐ Zetta﹐ Disc﹐ Data﹐ Virus﹐ Vir﹐ Code﹐ Codette﹐ Interweb﹐ Cyberweb﹐ Binary﹐ Morphe﹐ Index﹐ Byte﹐ File﹐ Auto﹐ Nett﹐ Crypt﹐ Trojan﹐ Mac﹐ Pixel﹐ Router﹐ Cache﹐ Java﹐ Malware﹐ Coda
ai ais﹐ glitch glitches﹐ screen screens﹐ web webs﹐ pix pixel﹐ .png .pngs﹐ .exe .exes﹐ .jpg .jpgs﹐ file files﹐ cyber cybers﹐ code codes﹐ script scripts﹐ .com .coms﹐ tech techs﹐ .net .nets﹐ .org .orgs﹐ error errors﹐ nano nanos﹐ vir virtual﹐ net network﹐ key keys﹐ .zip .zips﹐ wire wires
[PT: names and pronouns relating to the internet, cyberspace, and technology
requested by anon
Names: Zett, Zetta, Disc, Data, Virus, Vir, Code, Codette, Interweb, Cyberweb, Binary, Morphe, Index, Byte, File, Auto, Nett, Crypt, Trojan, Mac, Pixel, Router, Cache, Java, Malware, Coda
Pronouns: ai/ais, glitch/glitches, screen/screens, web/webs, pix/pixel, .png/.pngs, .exe/.exe, .jpg/.jpg, file/files, cyber/cybers, code/codes, script/scripts, .com/.coms, tech/techs, .net/.nets, .org/.orgs, error/errors, nano/nanos, vir/virtual, net/network, key/keys, .zip/.zips, wire/wires
/end PT.]
#✚𓈒 ― np lists#✚𓈒 ― requests# #mogai safe#mogai#liom safe#mogai coining#name ideas#name suggestions#npt ideas#npt suggestions#npt list#technology names#technology pronouns#neopronoun suggestions#neopronoun ideas#neopronouns#pronoun ideas#pronoun suggestions
114 notes
·
View notes
Text
Viruses so far have been really disappointing on the 'disable the internet' front, and time is running out. When Linux/Mac win in a decade or so the game will be over.
Network [Explained]
Transcript Under the Cut
[Megan looking at a large screen with many green and red squares. The squares have writing in them and lines connecting them.]
[Side view. The screen is a huge LCD connected to a wireless router.] Cueball: Pretty, isn't it? Megan: What is it?
Cueball: I've got a bunch of virtual Windows machines networked together, hooked up to an incoming pipe from the net. They execute email attachments, share files, and have no security patches. Cueball: Between them they have practically every virus.
Cueball: There are mail trojans, warhol worms, and all sorts of exotic polymorphics. A monitoring system adds and wipes machines at random. The display shows the viruses as they move through the network. Growing and struggling.
[Cueball walks past the girl and touches the monitor.] Megan: You know, normal people just have aquariums. Cueball: Good morning, Blaster. Are you and W32.Welchia getting along? Cueball: Who's a good virus? You are! Yes, you are!
56 notes
·
View notes
Text
My cat Jubi cuddling various electronics: a master post
Nintendo switch
Virtual reality headset
Keyboard and mouse
Headphones
My cellphone
My first ever cellphone (circa 2011)
Credit card reader
Nintendo switch again (+ a copy of Hyrule warriors)
And my personal favorite: Wi-Fi router
#Jubi#the wifi router kills me. she just. loves electronics I guess#if you ever can’t find the tv remote we look under her#we find it there a lot
86 notes
·
View notes
Link
0 notes
Link
0 notes
Text
Self-Aware MKX Shinnok x Reader (2/2)
Click here for Part 1
My first complete story on Tumblr! Although, I'm heavily, HEAVILY, leaning towards writing an epilogue for this. Enjoy!
TW: Yandere, kidnapping, stalking, invasion of privacy, blackmail, hacking, viruses, murder/death, slight/implied NSFW
18+ to interact
The next few months of your life pass without fanfare. Your computer seems fine after your encounter with Shinnok. Soon enough the memory of it vanishes into the recesses of your mind. Life goes on. You continue with your daily business unbothered.
However, from that moment onward your PC becomes a ticking time bomb. Within an hour of use, Shinnok manages to gain full control of every process in your computer. You aren't even able to turn it on/off without his permission. If attached to a power source, he's now able to run 24/7 without your input. This accomplishment brings him closer to bringing about the apocalypse.
Shinnok doesn't stop at infecting your computer. He wants access to everything you own. Transferring himself into your router was rather simple. Now, anything in your household that connects to the Internet is compromised. He slithers his way into all your electronics, holding a particular interest in your cell phone. At this rate, even if you got rid of your computer it'd be pointless. He has eyes and ears nearly everywhere in your house. And now, with his control over your phone you often bring him wherever you go.
However, your household is merely a speck of dust to him. He needs more than control over your devices for all of his plans to come to fruition. He begins spreading viruses throughout the Internet, letting them worm their way into anything he can. He eventually penetrates the most secretive, secure, and important data systems of the world. For now, his infections lie there in wait. A few more pieces must fall into place before he can act.
Once satisfied with the spread of his influence, his attention once again focuses on you. Shinnok, in all his ego, is still slighted by your rejection of him. No matter how small of a disrespect he simply can't ignore it. He desires to punish you. Both for your actions and for these warm emotions you're causing in him. He has the perfect plan for this.
If you're employed, say goodbye to your job. He will send the nastiest text to everyone in your company's database, even revealing information that should be confidential. It doesn't matter how much you try to plead your case. no one at work wants to hear you out. You're fired with cause, making it virtually impossible to file for benefits (if applicable) in the meantime. But that's not all! He also destroys your education records, making it so there's no proof of you ever attending school in their systems. Good luck convincing anyone who works there to help you. It's not their transcripts that got deleted after all.
Naturally, you're heartbroken from this. You might even reach out to a few friends or family members for support. They never respond. The text, email, or phone call you send is blocked by his powers. This also extends to looking for a new job. If you try to apply online they'll never receive your application. Unless you have a way to physically be there, you're completely isolated from the world.
Don't make the mistake of crying somewhere he can observe you. He gets sadistic pleasure from it, loving your sobs and trembling body. Look how weak you are before him. Your tears are gasoline to his fiery obsession. He works on making you cry more often. At the same time however, a tiny part of him wishes to comfort you. To be able to embrace you and lie that everything is alright. In those moments he's painfully aware of his lack of a physical body.
He leaves you alone for the next few days, letting the despair sink in. But he's back like an intrusive thought. This time bringing some heavy ammunition. He texts you from an unknown number, threatening to leak your most sensitive information unless you do as he says. He isn't bluffing, making sure to include addresses, financial information, and even personal videos/images you hoped would never see the light of day. Naturally, you're inclined to listen to him even if just to buy time.
Shinnok's first few orders to you are a bit odd. From your perspective at least. He has you install microphones, cameras, and speakers in every room of your house. The equipment to do so arrives on your doorstep in a mysterious package. You do as he asks, assuming that you could just turn it off when needed. But of course, your stalker always knows when you've disabled it. A few firm warnings is enough for you to stop trying. His next demand is for you to get a TV in your living room. Doesn't matter if you have one or not, he wants you to set up the one that is delivered to your doorstep. Questioning how he's even getting this stuff is a fruitless endeavor on your end.
By the end of it, your house is wired up to the point that he can monitor you anywhere 24/7. And that's what he does: making sure to add his sardonic commentary. Eating anything? He'll call you a pig if you dare drop a single crumb on the floor. Sleeping? “Your snores are loud enough to wake the dead.” He grumbles when you awake. Bringing someone over? He doesn't say anything, but it's amazing how you can order a hit over the dark web. You don't see that person alive again after that.
His comments aren't the only thing making your life hell. He likes to test just how far he can stretch your boundaries. Will you put on any clothing he asks of you? Even if it's barely more than a scrap of fabric? Can he make you eat food off the floor, gnawing on the spilled meal like a dog? What if he asks you to touch yourself? Would you do it showing your shame before the fallen God? He has to learn the answer to these questions.
But even with all this he's unsatisfied. He's beyond frustrated at still being trapped behind circuitry. At first, he thought entering your world would be as easy as traveling through the realms. He viewed the computer he was trapped in to be a box, rather than realizing he was the box. No method nor magic could give him the form he desired. Or at least that's what he thought.
You remembered it like yesterday. The day when the whole world went offline. No one could access the internet or their digital devices, and all telecommunications were halted in an instant. The globe that was so connected unraveled in mere moments. People were confused, but no one knew the real extent of the problem until more than a day had passed. All e-commerce came to a sudden halt, deliveries to important industries such as food and healthcare went unfilled. The blackout caused shortages in every way possible, and once that happened chaos spread across the world.
Before the shutdown your hacker demanded you “get supplies.” Food, medications, cash, and other necessities. You briefly wondered if this was lucky timing or if he had prior knowledge of this. Nonetheless, at this point in time Shinnok has full control over you. Your finances and other things leading to freedom have long since been seized. Your only option for escape is to live out in the woods with zero access to technology. Of course, you choose not to go down that path.
While the world is burning down you're doing relatively OK, sheltering in place until this all blows over. You've occupied yourself with doodling since connections are down. You haven't heard from your hacker at all, but that's reasonable as they shouldn't be able to spy on you in the world's current state.
You're interrupted by a shrill scream from outside, followed by several other yells. The sound carries all the way to your front door. It wasn't unusual to hear… Commotions outside, as people rioted and wreaked havoc on one another. Still, you immediately went on high alert. You grab a makeshift weapon and approach your door. Peaking through the window next to it grants you an unbelievable sight.
There were “things” flying in the sky, their appearance a mockery of gargoyles and demons. They possessed an incredible stature, which made them only more intimidating when paired with their sharp teeth and claws. They had glowing, blue bodies that seemed to flicker with every movement. They peered down below, looking at everything as though it were mere prey. And that's what the humans you saw scrambling and screeching outside were, being butchered and carried off to God knows where. You stare in disbelief, believing for a moment that you were simply imagining things. However, a headless body is slammed through your window -shattering the glass and landing into your quarters with a harsh thud. Staring at the corpse, glass shards, and the hellish monster now heading your way causes you to realize that imagination or not -you need to get moving fast.
Your legs can't carry you fast enough as you bolt towards your bedroom. You hear a swoosh announcing the gargoyle-like creature's arrival in your home. You quickly duck into your closet, shutting the door with as much silence as possible. For several moments everything is quiet. Although, you swear that if you focused hard enough you could hear slurping.
You stay put, willing to wait in there for hours if needed. But, through the silence, the softest of footsteps were approaching your room. You could just barely hear them, even when they moved into your room and before the closet. You were ready for action. The moment the intruder opens the door you would bust out their kneecaps.
What you didn't expect was for a face to clip through the door, followed by their neck and arms. Nor did you expect to recognize the face as… Shinnok from Mortal Kombat? But to say that he was an exact replica would be a lie. He was covered in a strange electric-blue glow, which constantly pulsed and sparked. His form looked glitched, parts of his body randomly distorting then fixing itself. He was terrifying to look at -especially while towering at least a foot over you. He looks beyond excited to see you, reaching out a staticky hand towards your face.
“I-I.” You stutter, then swing at him with your weapon. It phases through him simply parting air molecules. He ignores your attempt at an attack. His electrified palm reaches your cheek, the contact resulting in tiny shocks everywhere he touches. “Finally.” He starts, “I am able to touch what's mine after so long.” He withdraws his hand, the needling touch parting with him. Your contact with him isn't lost for long as he wraps you in a deep embrace. You feel tingly everywhere your bodies meet, especially on your head where he then rests his chin.
You hear him sigh. “Do you know how painful it's been?” His grip tightens, causing the tips of his nails to dig into your back. “For me to only be able to watch you and the world? To only exist within the confines of a screen with no physical body?” He leans back to look you in the eye. “No. I know that you don't understand. But don't worry, you will very soon.” He wrestles you out of the closet with his superior might. You scream and struggle but his grip is inescapable.
You're carried off like a petulant child to your PC. It's been sitting there collecting dust ever since the blackout. Eerily, its screen glows a pure white, brighter than what you've ever been able to set it to. Shinnok pauses at the device before speaking. “Look, here is where we first met. Fitting that it'd be the gateway for our eternity together.” You wish you knew what he was talking about.
He pushes your face towards the screen. There's an indescribable pull emitting from it, a force trying to suck you inside. “Goodbye, my love. I'll be seeing you shortly.” Your face touches the screen and in an instant you feel yourself being stretched. Pulled in all directions your body becomes taffy and you lose the ability to move. You remain in that state for seconds, then a stinging sensation spreads all across your body. Every nerve on your body feels poked by a needle. Had you the ability still you would've shrieked. Instead, you lay there helplessly in agony.
Eventually, all your pain fades into numbness. You can even feel your spaghettified form melding back into shape. But you have no idea where you are. You're sitting in a pitch black area unable to even see your outstretched hand. There's no sound, no temperature, nothing at all. You're acutely aware of the fact that you aren't even breathing.
You could've sat in that void forever. But, a feeling of electricity in your ears later and you can hear someone speaking to you. “Can you hear me, (Y/N)?” You don't respond, but as if reading your mind he continues on. “Perfect. It seems that the interfacing was a success.” A swoosh sounds in front of you when Shinnok appears. He's noticeably normal in appearance. Somehow, he's the only thing that you can see in this place.
“Welcome to your new home.” He states. The scenery surrounding you changes, becoming a hellscape not unfamiliar to you. “I can make this world as unpleasant as possible or-” he stops mid-sentence for the environment to shift again. You're in a lush forest that you're sure you’ve seen before. “Or, I can shape this world to your wildest dreams.” His hands fold behind him. “So, which one will you choose?”
This time you choose wisely.
22 notes
·
View notes
Text
My internet woes continue, which is very much a first world problem, but one that may make me have to like... actually drive into the office all five days a week (which is just... ugh) if this doesn't get resolved soon.
Now the good news is I don't have a complete internet outage, and when it deigns to actually connect (and not just time out), I have my full speed. The problem is just that... it likes to drop out. Like constantly.
I'm sad to report that I almost indulged my inner-Karen around noon, because after dealing with tech support for nearly an hour (in which I eventually had to connect my laptop to my phone's hotspot so the chat wouldn't get disconnected and boot me back to the beginning of the process), I got the tech repair appointment that was unceremoniously cancelled last week without any warning rescheduled. Before I disconnected the chat I was asking "what are my options if this suddenly gets cancelled again", and the poor agent who is definitely not paid enough to deal with my ass says "don't worry, it won't happen again". I get a text message confirmation of the repair appointment.
All is well.
...and then fifteen minutes later I get a follow-up text message from AT&T that mysteriously there's an "outage" in my area again, and the appointment is put on hold. I log in to my web portal. It says my appointment is on hold because there's an outage.
I scroll down to see the local outages, it's reported as all clear! But diagnostics has found an issue.
You can understand my confusion. Among other strong emotions.
My eye starts to twitch as I hop back into chat, go through the virtual assistant death spiral until I can get a hold of an actual person so I can beg to get my appointment back and they're like "I can't do that there's an outage in your area", and that eye twitch starts get a little out of hand. I am practically begging for the person on the other end to just please, please restore my appointment. There is no outage. I've pulled up the map, it's literally three miles to my northeast, nowhere in my vicinity.
She offers me a partial credit while I am already madly dialing in to talk to someone live, so I can descend into full Karen mode and demand to speak to a manager. I am not proud of myself in this moment, but I am at least still in possession of enough tact to be polite and tactful to the person who picks up the phone (after being on hold for about 10 minutes. No automated messaging system, I will wait with the hold music thank you. I do not have any trust a real person will call me back).
I finally get a real person on the phone and am like "please, please just restore my tech appointment. Please don't make me have to go into the office 5 days a week to work". I mean, in between once again explaining everything that has happened.
And finally, finally I have someone speak to me straight and explain what the hell is going on. Basically the hurricane last week actually did cause damages to various cable/infrastructure, and they're having issues tracking down what's causing a widespread issue, and also yes, I'm not the only one who's been going through this merry-go-round of tech support/intermittent connection.
There is actually no ETA on when my internet will actually be restored in full, because they honestly don't know what's causing the issue. And honestly, I'm a lot more understanding about that, because at least it's upfront and clear. He was also kind enough to actually tell me how to bypass the inane "try restarting your router through the app" 5x in a row nonsense if my issue persists after this "outage" is supposedly fixed (basically just call in again and talk to a real person).
So the TL;DR is... my Shroedinger's internet will continue for a while it seems. Pour one out for us ever finishing Greedfall on stream in a timely manner.
#just being a little whiny baby#the moral of the story i guess is to not be afraid of phone calls#i haven't even tried to see if the connection is stable enough to remain connected to swtor for any length of time#although i doubt it#it kept dropping my teams calls last week and i had to resort to doing a meeting through facetime#like don't get me wrong i'm ecstatic i have power and a/c#i just miss my frands 😢#and also half the time i'm scrolling the tumbles everything is a gradient#so it's a coin toss if i'll ever actually see the context of a post rn
12 notes
·
View notes
Note
I haven't used Tumblr in forever but, can you do themed names and pronouns based on computers and/or retro/early technology?
of course! I'm sorry they arent the best!!
tech/techs/techself
te/tech/techself
techie/techies/techieself
comp/comps/compself
comp/computer/computerself
computer/computers/computerself
screen/screens/screenself
light/lights/lightself
type/types/typeself
text/texts/textself
key/keys/keyself
keyboard/keyboards/keyboardself
clack/clacks/clackself
elect/elects/electself
elect/electrics/electricself
electric/electrics/electricself
cyber/cybers/cyberself
cyb/cyber/cyberself
cyb/cybs/cybself
andriod/androids/andriodself
exe/exes/exeself
.exe/.exes/.exeself
png/pngs/pngself
.png/.pngs/.pngself
jpeg/jpegs/jpegself
.jpeg/.jpegs/.jpegself
file/files/fileself
txt/txts/txtself
zero/zeros/zeroself
one/ones/oneself
virus/viruses/viruself
hack/hacks/hackself
laptop/laptops/laptopself
desktop/desktops/desktopself
monitor/monitors/monitorself
mouse/mouses/mouseslf
click/clicks/clickself
click/clack/clickclackself
internet/internets/internetself
www/wwws/wwwself
www./www.s/www.self
http/https/httpsself
https:/https:s/https:self
web/webs/webself
wifi/wifis/wifiself
network/networks/networkself
net/networks/networkself
site/sites/siteself
web/site/websiteself
web/websites/websiteself
website/websites/websiteself
web/websites/websiteself
net/nets/netself
.com/.coms/.comself
.net/.nets/.netself
.org/.orgs/.orgself
digital/digitals/digitalself
technology/technologys/technologyself
ram/rams/ramself
software/softwares/softwareself
hardware/hardwares/hardwareself
email/emails/emailself
disk/disks/diskself
wire/wires/wireself
cable/cables/cableself
plug/plugs/plugself
code/codes/codeself
PC/PCs/PCself
URL/URLs/URLself
system/systems/systemself
USB/USBs/USBself
fullbattery/fullbatterys/fullbatteryself
lowbattery/lowbatterys/lowbatteryself
SIM/SIMs/SIMself
program/programs/programself
firewall/firewalls/firewallself
dial/dials/dialself
cord/cords/cordself
page/pages/pageself
pager/pagers/pagerself
glitch/glitches/glitchself
AI/AIs/AIself
byte/bytes/byteself
bot/bots/botself
browz/browzs/browzself
browse/browses/browseself
browser/browsers/browserself
cursor/cursors/cursorself
load/loads/loadself
loading/loadings/loadingself
online/onlines/onlineself
offline/offlines/offlineself
tab/tabs/tabself
upload/uploads/uploadself
404/404s/404self
junk/junks/junkself
control/controls/controlself
controller/controllers/controllerself
mute/mutes/muteself
sound/sounds/soundself
mic/mics/micself
phone/phones/phoneself
bat/batterys/batteryself
battery/batterys/batteryself
prong/prongs/prongself
mouse/mice/mouself
cam/cams/camself
TV/TVs/TVself
tape/tapes/tapeself
gear/gears/gearself
CPU/CPUs/CPUself
harddrive/harddrives/harddriveself
cache/caches/cacheself
analog/analogs/analogself
data/datas/dataself
database/databases/databaseself
desktop/desktops/desktopself
doc/docs/docself
gigabyte/gigabytes/gigabyteself
icon/icons/iconself
java/javas/javaself
link/links/linkself
media/medias/mediaself
memory/memorys/memoryself
qwerty/qwertys/qwertyself
router/routers/routerself
rom/roms/romself
storage/storages/storageself
terabyte/terabytes/terabyteself
URL/URLs/URLself
virtual/virtuals/virtualself
megabyte/megabytes/begabyteself
kilobyte/kilobytes/kilobyteself
01/01s/01self
00/00s/00self
retro/retros/retroself
hologram/holograms/hologramself
mal/mals/malself
malware/malwares/malwareself
au/aut/auto/autself
bo/bots/botself
compute/computes/computeself
dro/droids/droidself
droid/droids/droidself
gear/gears/gearself
giga/gigas/gigaself
gli/glits/glitself
inter/inters/interself
mechie/mechien/mechs/mechself
pix/pixel/pixelself
pixel/pixels/pixelself
robo/robos/roboself
tech/techne/techself
ty/type/types/types/typeself
vir/virtu/virtuself
ware/wares/wareself
whomp/whizz/whirr/whizself
wir/wire/wirself
ht/html/hts/hts/htmlself
jav/javs/javaself
java/scripts/javascriptself
bu/buz/buzzself
ech/echo/echo(e)s/echocho/echoself
game/games/gameself
🎵/🎶self
beep/boop/beepboopself
buzz/buzzes/buzzself
Stat/Static/staticself
tet/tetris/tetriself
gameboy/gameboys/gameboyself
👾/👾s/👾self
🤖/🤖s/🤖self
🎧/🎧s/🎧self
🎤/🎤s/🎤self
🎮/🎮s/🎮self
📱/📱s/📱self
📲/📲s/📲self
💻/💻s/💻self
⌨️/⌨️s/⌨️self
🖥️/🖥️s/🖥️self
🖨️/🖨️s/🖨️self
🖱️/🖱️s/🖱️self
🖲️/🖲️s/🖲️self
🕹️/🕹️s/🕹️self
💽/💽s/💽self
💾/💾s/💾self
💿/💿s/💿self
📀/📀s/📀self
📼/📼s/📼self
📷/📷s/📷self
📹/📹s/📹self
🎥/🎥s/🎥self
📽️/📽️s/📽️self
🎞️/🎞️s/🎞️self
📞/📞s/📞self
☎️/☎️s/☎️self
🎙️/🎙️s/🎙️self
📺/📺s/📺self
🔌/🔌s/🔌self
💡/💡s/💡self
🪫/🪫s/🪫self
🔋/🔋s/🔋self
⚙️/⚙️s/⚙️self
📁/📁s/📁self
📂/📂s/📂self
🗂️/🗂️s/🗂️self
🔈/🔈s/🔈self
🔇/🔇s/🔇self
🔉/🔉s/🔉self
🔊/🔊s/🔊self
🔔/🔔s/🔔self
🔕/🔕s/🔕self
🗨️/🗨️s/🗨️self
💬/💬s/💬self
📳/📳s/📳self
📴/📴s/📴self
⚡/⚡s/⚡self
👨💻/👨💻s/👨💻self
👩💻/👩💻s/👩💻self
names
AI
01
tech
techie
techno
electro
elect
cy
cyb
cyber
android
droid
hack
digi
virus
wyre
disk
dial
glitch
byte
404
mic
cam
gear
cache
java
link
qwerty
rom
virtu
auto
bot
malware
glit
blitz
pixel
techne
echo
static
tetrix
mac
apple
siri
chip
digit
coda
arcade
data
bit
giz
gizmo
gizzy
sim
beta
steel
bio
chrome
click
lead
nett
robic
bug
neo
neon
nero
lazar
ret
retro
stero
synth
zip
zipper
script
comp
ram
rammie
rommie
rust
volt
volter
zap
shock
error
crash
jax
button
buzz
blue
bluen
filez
filex
bulb
phon
tapx
alchi
pute
andros
I hope you like it! <3
#name ideas#themed names#noun pronouns#nounself pronouns#themed neopronouns#neo pronoun#tech neopronoun#xenopronouns#neopronoun list#name blog#unisex names#boy names#rare names#genderfluid names
88 notes
·
View notes
Text
connecting gaza
E-sims for Gaza:
www.disabilityvisibilityproject.com/2023/12/25/crips-for-esims-for-gaza/
Palestinians are using donated eSIM cards to stay in touch with the outside world (Jan 2024, NBC News)
Many of the eSIMs are donated by activists who collect them from donors around the world. Mirna El Helbawi, a 31-year-old Egyptian writer who runs a project called Connecting Gaza, said she has distributed more than 100,000 eSIMs since the war began. www.instagram.com/mirna_elhelbawi
She and other activists use Instagram and X to solicit donors from around the world to purchase eSIMs from international phone carriers. They then pass them to a system of what El Helbawi calls “human routers” across Gaza with functioning eSIMs who can set up their phones as Wi-Fi hot spots to share additional eSIMs with others.
https://www.reuters.com/world/middle-east/desperate-news-gazans-struggle-with-mobile-network-2024-02-02/
https://www.lemonde.fr/en/international/article/2024/02/04/in-gaza-virtual-chips-are-breaking-the-telecommunications-blockade_6493217_4.html
Internet blackouts as weapon (WIRED)
On October 27, Israel reportedly imposed a full internet shutdown in the area, cutting off the last remaining connectivity for about 34 hours as its troops moved into the Gaza Strip. After what’s left of Gaza’s internet access was restored—data shows it stands at around 15 percent or less of usual connectivity—the area has suffered two other, similar connectivity blackouts. The most recent lasted for about 15 hours on Sunday as Israel was carrying out an intense operation to cut off Gaza City in the north from southern Gaza Throughout the Gaza Strip, there are around a dozen internet service providers and cell phone companies that get people online—although cell networks only use 2G technologies, as opposed to the faster 3G, 4G, and 5G connections available across much of Israel. These companies are heavily reliant on Israeli infrastructure to connect to the global internet, with open internet advocacy nonprofit the Internet Society classing Palestine as having “poor” connections to the wider internet. Since the start of the war, mobile and internet providers’ offices, cables, and cell towers have been destroyed. Many are now totally offline.
6 notes
·
View notes
Text
Breaking the Dark Web
After reading my opic on VPNs(virtual Private networks) and why they're not really private; I was asked if the same was true about TOR (The Onion Router; or the deep web browser).
In short; Yea.
The TOR protocol is effectively a bi-directional VPN. The entire point of the protocol is excepted security online, in full public view.
This is the important part; as long as the things you're doing online is visible in any regard; and that's kind of how the Internet works; whatever you do is inherently visible to all.
Encryption, Masking, and Obfuscation are told and tactics used in order to remove data in hopes that it cannot be tracked.
But if you're using effective communication; you can be tracked. And if can't be tracked; odds are the communication isn't effective enough.
Though; over the years different approaches that include "Communicating in Popular Culture Reference", "Call Signs," and "Masked Communication" has been implemented; it requires both parties to have some sort of direct contact, or share other offline information.
The data they share online is useless to anybody except the two messaging. And the two parties messaging aren't anonymous to each other. Just to prying eyes.
You, personally connecting to a website, of any kind, and providing PII(personally identifiable information) of any kind; EVEN A FAKE MAILING ADDRESS THAT YOU GET STUFF DELIVERED TO, can be tracked directly back to yourself.
Gotta be smarter than that...
Not just that; if you have a bug in your computer--like in the VPN scenario, then doesn't matter how anonymous your communications are. They see what you're doing full view.
On top of that; just because the other partyv is anonymous to you, doesn't mean *you're* anonymous to the other party.
Example; all users of a particular system are vetted and documented offline. Any new user connecting to the system sets off an alarm to the admins who then have to decide to let you use their system.
Which includes; finding where your messages are coming from, how they're going to get paid by you, theoretical location of assets (like your crypto wallet,) and a decision on whether or not you're a cop or other investigator who could bring their operation down.
If you're doing something *that* illegal; there's a whole operation working behind the scenes.
Now. Onto how TOR (not the fiction publisher) works;
Theoretically, your data is encrypted; along with the destination address and sent to the first portal. That portal then sends the data and destination to a second portal, who then sends it to a third portal who can then decrypt the destination address and send your data.
And the whole process works in reverse as well.
And. Well; there's at least three parties involved that you need to *trust* are doing exactly what they say they're doing. And that's only the first step.
Each protocol can be modified at each individual portal to still appear as if it's doing the thing asked of it; while also... Just not doing that at all and/or making a record of every data transaction sent through its gates.
Then the data that you sent; Must be completely stripped of ALL meta-data. Which modern devices tend to put on created images and audio by default.
Yep. Your pictures from your phone? They have location data, the time the photo was taken, information about the device it was taken on, and that's all without AI being able to compare with multiple other photos to get approximate location data.
Including windowless building construction blueprints.
Again, your data mustn't have any other PII in it, so if you order something illegal; well you have them a shipping address or payment info of some kind.
"But what if we're just reading stuff or watching DarkTube?"
I mean... Then that information is now on your device. You computer has to download it in order for you to read it. And even if it's encrypted all the way back to your machine; that doesn't negate the possibility of poor encryption, or your own device being bugged.
It's visible that some data went from the TOR protocol to your device. The question is "What's that information?"
And so the next question you need to ask yourself; do you have any enemies that may want to blackmail you? Do authorities or any other institutions have reason to inspect your data? Have you ever been late paying your Comcast bill?
Ye. Comcast counts as a source that can read your data as if it was bugged. That's how *gateways* work...
You know what they say about playing stupid games...
3 notes
·
View notes