Topic: Internet (Page 5)
You are looking at all articles with the topic "Internet". We found 81 matches.
Hint:
To view all topics, click here. Too see the most popular topics, click here instead.
π Firefox Wikipedia Page Contains Recursive Screenshot of Itself
Mozilla Firefox or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. Firefox uses the Gecko rendering engine to display web pages, which implements current and anticipated web standards. In 2017, Firefox began incorporating new technology under the code name Quantum to promote parallelism and a more intuitive user interface. Firefox is available for Windows 7 or Windows 10, macOS, and Linux. Its unofficial ports are available for various Unix and Unix-like operating systems including FreeBSD, OpenBSD, NetBSD, illumos, and Solaris Unix. Firefox is also available for Android and iOS. However, the iOS version uses the WebKit layout engine instead of Gecko due to platform requirements, as with all other iOS web browsers. An optimized version of Firefox is also available on the Amazon Fire TV, as one of the two main browsers available with Amazon's Silk Browser.
Firefox was created in 2002 under the code name "Phoenix" by the Mozilla community members who desired a standalone browser, rather than the Mozilla Application Suite bundle. During its beta phase, Firefox proved to be popular with its testers and was praised for its speed, security, and add-ons compared to Microsoft's then-dominant Internet ExplorerΒ 6. Firefox was released on November 9, 2004, and challenged Internet Explorer's dominance with 60Β million downloads within nine months. Firefox is the spiritual successor of Netscape Navigator, as the Mozilla community was created by Netscape in 1998 before their acquisition by AOL.
Firefox usage share grew to a peak of 32.21% at the end of 2009, with Firefox 3.5 overtaking Internet Explorer 7, although not all versions of Internet Explorer as a whole. Usage then declined in competition with Google Chrome. As of AugustΒ 2021, according to StatCounter, Firefox has 7.62% usage share as a "desktop" web browser, making it the fourth-most popular web browser after Google Chrome (68.76%), Safari (9.7%) and Microsoft Edge (8.1%), while its usage share across all platforms is lower at 3.45% in third place (after Google Chrome with 65.27% and Safari with 18.34%).
Discussed on
- "Firefox Wikipedia Page Contains Recursive Screenshot of Itself" | 2021-10-06 | 74 Upvotes 5 Comments
π Censorship by Google
Google and its subsidiary companies, such as YouTube, have removed or omitted information from its services to comply with its company policies, legal demands, and government censorship laws. Google's censorship varies between countries and their regulations, and ranges from advertisements to speeches. Over the years, the search engine's censorship policies and targets have also differed, and have been the source of internet censorship debates.
Numerous governments have asked Google to censor what they publish. In 2012, Google ruled in favor of more than half of the requests they received via court orders and phone calls. This did not include China and Iran who had blocked their site entirely.
Discussed on
- "Censorship by Google" | 2020-05-19 | 59 Upvotes 17 Comments
π Police target CUHK university as it holds HKIX which routes 99% of net traffic
Hong Kong Internet eXchange (HKIX; Chinese: ι¦ζΈ―δΊθ―ηΆ²δΊ€ζδΈεΏ) is an internet exchange point in Hong Kong. The cooperative project is initiated by the Information Technology Services Centre (ITSC) of the Chinese University of Hong Kong (CUHK) providing the service free of charge. It is now operated by HKIX Limited, a wholly owned subsidiary of the CUHK Foundation.
The aim of the HKIX is to connect Internet service providers (ISPs) in Hong Kong so that intra-Hong Kong traffic can be exchanged locally without routing through the US or other countries. 99% internet interaction in Hong Kong goes through the centre, and HKIX acts as Hong Kong's network backbone. According to Cloudflare, HKIX is the largest internet exchange point in Asia.
Discussed on
- "Police target CUHK university as it holds HKIX which routes 99% of net traffic" | 2019-11-14 | 42 Upvotes 27 Comments
π Enshittification
Enshittification, also known as platform decay, is a way to describe the pattern of decreasing quality of online platforms that act as two-sided markets. Enshittification can be seen as a form of rent-seeking. Examples of alleged enshittification have included Google Search, Amazon, Bandcamp, Facebook, Reddit, and Twitter.
Discussed on
- "Enshittification" | 2023-12-12 | 28 Upvotes 16 Comments
- "Enshittification" | 2023-10-23 | 18 Upvotes 1 Comments
π Multi-User Dungeon (MUD)
A multi-user dungeon (MUD, ), also known as a multi-user dimension or multi-user domain, is a multiplayer real-time virtual world, usually text-based or storyboarded. MUDs combine elements of role-playing games, hack and slash, player versus player, interactive fiction, and online chat. Players can read or view descriptions of rooms, objects, other players, and non-player characters, and perform actions in the virtual world that are typically also described. Players typically interact with each other and the world by typing commands that resemble a natural language, as well as using a character typically called an avatar.
Traditional MUDs implement a role-playing video game set in a fantasy world populated by fictional races and monsters, with players choosing classes in order to gain specific skills or powers. The objective of this sort of game is to slay monsters, explore a fantasy world, complete quests, go on adventures, create a story by roleplaying, and advance the created character. Many MUDs were fashioned around the dice-rolling rules of the Dungeons & Dragons series of games.
Such fantasy settings for MUDs are common, while many others have science fiction settings or are based on popular books, movies, animations, periods of history, worlds populated by anthropomorphic animals, and so on. Not all MUDs are games; some are designed for educational purposes, while others are purely chat environments, and the flexible nature of many MUD servers leads to their occasional use in areas ranging from computer science research to geoinformatics to medical informatics to analytical chemistry. MUDs have attracted the interest of academic scholars from many fields, including communications, sociology, law, and economics. At one time, there was interest from the United States military in using them for teleconferencing.
Most MUDs are run as hobbies and are free to play; some may accept donations or allow players to purchase virtual items, while others charge a monthly subscription fee. MUDs can be accessed via standard telnet clients, or specialized MUD clients, which are designed to improve the user experience. Numerous games are listed at various web portals, such as The Mud Connector.
The history of modern massively multiplayer online role-playing games (MMORPGs) like EverQuest and Ultima Online, and related virtual world genres such as the social virtual worlds exemplified by Second Life, can be traced directly back to the MUD genre. Indeed, before the invention of the term MMORPG, games of this style were simply called graphical MUDs. A number of influential MMORPG designers began as MUD developers and/or players (such as Raph Koster, Brad McQuaid, Matt Firor, and Brian Green) or were involved with early MUDs (like Mark Jacobs and J. Todd Coleman).
Discussed on
- "Multi-User Dungeon (MUD)" | 2025-11-14 | 36 Upvotes 22 Comments
π Artificial Intelligence Act (EU Law)
The Artificial Intelligence Act (AI Act) is a European Union regulation concerning artificial intelligence (AI).
It establishes a common regulatory and legal framework for AI in the European Union (EU). Proposed by the European Commission on 21 April 2021, and then passed in the European Parliament on 13 March 2024, it was unanimously approved by the Council of the European Union on 21 May 2024. The Act creates a European Artificial Intelligence Board to promote national cooperation and ensure compliance with the regulation. Like the EU's General Data Protection Regulation, the Act can apply extraterritorially to providers from outside the EU, if they have users within the EU.
It covers all types of AI in a broad range of sectors; exceptions include AI systems used solely for military, national security, research and non-professional purposes. As a piece of product regulation, it would not confer rights on individuals, but would regulate the providers of AI systems and entities using AI in a professional context. The draft Act was revised following the rise in popularity of generative AI systems, such as ChatGPT, whose general-purpose capabilities did not fit the main framework. More restrictive regulations are planned for powerful generative AI systems with systemic impact.
The Act classifies AI applications by their risk of causing harm. There are four levels β unacceptable, high, limited, minimal β plus an additional category for general-purpose AI. Applications with unacceptable risks are banned. High-risk applications must comply with security, transparency and quality obligations and undergo conformity assessments. Limited-risk applications only have transparency obligations and those representing minimal risks are not regulated. For general-purpose AI, transparency requirements are imposed, with additional evaluations when there are high risks.
La Quadrature du Net (LQDN) stated that the adopted version of the AI Act would be ineffective, arguing that the role of self-regulation and exemptions in the act rendered it "largely incapable of standing in the way of the social, political and environmental damage linked to the proliferation of AI".
Discussed on
- "EU Passes the Artificial Intelligence Act" | 2024-05-29 | 23 Upvotes 17 Comments
π Captive Wi-Fi
A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources. Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license agreement/acceptable use policy, or survey completion. Captive portals are used for a broad range of mobile and pedestrian broadband servicesΒ β including cable and both commercially provided Wi-Fi and home hotspots. A captive portal can also be used to provide access to enterprise or residential wired networks, such as apartment houses, hotel rooms, and business centers.
The captive portal is presented to the client and is stored either at the gateway or on a web server hosting the web page. Depending on the feature set of the gateway, websites or TCP ports can be allow-listed so that the user would not have to interact with the captive portal in order to use them. The MAC address of attached clients can also be used to bypass the login process for specified devices.
WISPr refers to this web-browserβbased authentication method as the Universal Access Method (UAM).
Discussed on
- "Captive Wi-Fi" | 2026-01-18 | 27 Upvotes 23 Comments
π .yu domain expires today (30/Sept/2009)
.yu was the Internet country code top-level domain (ccTLD) that was assigned to Yugoslavia and was mainly used by the Federal Republic of Yugoslavia and its successor states from 1994 and 2010. After Serbia and Montenegro acquired separate .rs and .me domains in 2007, a transition period started, and the .yu domain finally expired on 30 March 2010. It was the most heavily used top-level domain ever to be deleted, as usage of Internet was much higher than in the beginning of 1990s, at the time of German reunification, and the dissolutions of Czechoslovakia and the Soviet Union.
Discussed on
- ".yu domain expires today (30/Sept/2009)" | 2009-09-30 | 24 Upvotes 23 Comments
π XZ Utils Backdoor
In February 2024, a malicious backdoor was introduced to the Linux build of the xz utility within the liblzma library in versions 5.6.0 and 5.6.1 by an account using the name "Jia Tan". The backdoor gives an attacker who possesses a specific Ed448 private key remote code execution through OpenSSH (a suite of secure networking utilities) on the affected Linux system. The issue has been given the Common Vulnerabilities and Exposures number CVE-2024-3094 and has been assigned a CVSS score of 10.0, the highest possible score.
While xz is commonly present in most Linux distributions, at the time of discovery the backdoored version had not yet been widely deployed to production systems, but was present in development versions of major distributions. The backdoor was discovered by the software developer Andres Freund, who announced his findings on 29 March 2024.
Discussed on
- "XZ Utils Backdoor" | 2025-12-19 | 25 Upvotes 21 Comments
π Ted Nelson
Theodor Holm Nelson (born June 17, 1937) is an American pioneer of information technology, philosopher and sociologist. He coined the terms hypertext and hypermedia in 1963 and published them in 1965. Nelson coined the terms transclusion, virtuality, and intertwingularity (in Literary Machines), and teledildonics. According to a 1997 Forbes profile, Nelson "sees himself as a literary romantic, like a Cyrano de Bergerac, or 'the Orson Welles of software.'"
Discussed on
- "Ted Nelson" | 2013-08-11 | 25 Upvotes 3 Comments
- "The inventor of hypertext" | 2012-09-26 | 7 Upvotes 10 Comments