V

Yüzbaşı
21 Mayıs 2011
Tarihinde Katıldı
Takip Ettikleri
1 üye
Görüntülenme (?)
37 (Bu ay: 1)
Gönderiler Hakkında
V
7 yıl
Razer Kraken 7.1 v2 470lira verilirmi ?
300-400 lira bütcem var skyrim,witcher,fallout tarzı oyunlar oynuyorum bu yüzden beni atmosfere sokabilecek bir kulaklık arıyorum(Mikrofonuda güzel olursa fena olmaz) daha iyi bi altarnatif söyleyebilirmisiniz ?
Birde bu kraken serisinde prolar 7.1 olmuyor galiba chroma işin içine girincede fiyat yükseliyor kraken 7.1 v2 nin yokmu renksiz olanı ?
V
7 yıl
4000-4500 tl arası oyun için laptop tavsiyesi istiyorum.
Oyun amaçlı kullanabileceğim bi laptop arıyorum ekran kartı nvidia tercihim.asus kullanıyorum oyun oynarken fan elimi yakıyor mümkünse fanlar arkada olsun,bütce 5000e çıkarılabilir.
V
7 yıl
Deliricem oyun yüklenmiyor.(Gta 5)
Ya ön siparişle almıştım oyunu zamanında zar zor indirdik oynadık sonra pc formata gitti 1 yıldır felan aralıklarla indirmeye çalışıyorum oyunu her seferinde connection lost diyor sıkılıp komple siliyorum oyunu. Denilen her şeyi yaptım firewall'a baktım virüs programına baktım ultrasurf benzeri vpnleri denedim 12 mbit net var acaba dedim server indirirken kısıtlıyormu kota 3'e düştükten sonra denedim her türlü hatayı veriyor 216,217,202 çıldırıcam
ama yok yok bi ara retry butonuna ısrarla tıklayarak oyunu tam indirdim fakat açılmadı oyun neymiş dosyalar corrupt olmuş bağlantı kesilmeden indirilmesi gerekmiş ama olmuyor kardeş enayi gibi hissediyorum kendimi korsan indirsem daha rahat oynarım.
V
7 yıl
2000-2600 arası klima Acil(Yanıyorum)
Balkon kırması bir odam var 21 m2. Uzunlamasına 7 metre pimapen cam var ve sabah güneşini acayip alıyor öyle bir ısınıyor ki oda akşam 12 ye kadar bırakmıyor o ısıyı.Klima işinden anlamam bana acilinden beni rahatlatıcak faturayı uçurmayan bir klima önerirmisiniz ?
V
8 yıl
Rica etsem bu metni türkçeye çevirebilirmisiniz ?
1. Cybercrime, or computer crime, is crime that involves a computer and a network.
2. The computer may have been used in the commission of a crime, or it may be the target.
3. Debarati Halder and K. Jaishankar define cybercrimes as: "Offences that are committed
4. against individuals or groups of individuals with a criminal motive to intentionally harm the
5. reputation of the victim or cause physical or mental harm, or loss, to the victim directly or
6. indirectly, using modern telecommunication networks such as Internet (networks including
7. but not limited to Chat rooms, emails,notice boards and groups) and mobile phones
(Bluetooth/SMS/MMS)".
8. Cybercrimes may threaten a person or a nation's security and financial health.
9. Issues surrounding these types of crimes have become high-profile, particularly those
10. surrounding hacking, copyright infringement, unwarranted mass-surveillance, child pornography, and child
11. grooming. There are also problems of privacy when confidential information is intercepted or
12. disclosed, lawfully or otherwise. Debarati Halder and K. Jaishankar further define cybercrime from the
13. perspective of gender and defined 'cybercrime against women' as "Crimes targeted against women with
14. a motive to intentionally harm the victim psychologically and physically, using modern telecommunication
15. networks such as internet and mobile phones". Internationally, both governmental and non-state actors
16. engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity
17. crossing international borders and involving the interests of at least one nation state is sometimes
18. referred to as cyberwarfare.
19. A report (sponsored by McAfee) estimates that the annual damage to the global economy is at $445
20. billion; however, a Microsoft report shows that such survey-based estimates are "hopelessly flawed" and
21. exaggerate the true losses by orders of magnitude. Approximately $1.5 billion was lost in 2012 to online
22. credit and debit card fraud in the US. In 2016, a study by Juniper Research estimated that the costs of
23. cybercrime could be as high as 2.1 trillion by 2019.
24. Computer crime encompasses a broad range of activities.
25. Fraud and financial crimes - Main article: Internet fraud
26. Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from
27. doing something which causes loss. In this context, the fraud will result in obtaining a benefit by:
28. *Altering in an unauthorized way. This requires little technical expertise and is common form of theft by
29. employees altering the data before entry or entering false data, or by entering unauthorized instructions or
30. using unauthorized processes;
31. *Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions.
This is difficult to detect;
32. *Altering or deleting stored data;
33. Other forms of fraud may be facilitated using computer systems, including bank fraud, carding, identity theft,
34. extortion, and theft of classified information.A variety of internet scams, many based on phishing and social
35. engineering, target consumers and businesses.
36. Cyberterrorism - Main article: Cyberterrorism
37. Government officials and information technology security specialists have documented a significant
38. increase in Internet problems and server scans since early 2001. But there is a growing concern among
39. federal officials that such intrusions are part of an organized effort by cyberterrorists, foreign
40. intelligence services, or other groups to map potential security holes in critical systems. A cyberterrorist
41. is someone who intimidates or coerces a government or organization to advance his or her political or
42. social objectives by launching a computer-based attack against computers, networks, or the information
43. stored on them.
44. Cyberterrorism in general, can be defined as an act of terrorism committed through the use of
45. cyberspace or computer resources (Parker 1983). As such, a simple propaganda in the Internet, that
46. there will be bomb attacks during the holidays can be considered cyberterrorism. There are also hacking
47. activities directed towards individuals, families, organized by groups within networks, tending to cause
48. fear among people, demonstrate power, collecting information relevant for ruining peoples' lives,
49. robberies, blackmailing etc.
50. Cyberextortion - Main article: Extortion,
51. Cyberextortion occurs when a website, e-mail server, or computer system is subjected to or threatened
52. with repeated denial of service or other attacks by malicious hackers. These hackers demand money in
53. return for promising to stop the attacks and to offer "protection". According to the Federal Bureau of
54. Investigation, cyberextortionists are increasingly attacking corporate websites and networks, crippling
55. their ability to operate and demanding payments to restore their service. More than 20 cases are
56. reported each month to the FBI and many go unreported in order to keep the victim's name out of the
57. public domain. Perpetrators typically use a distributed denial-of-service attack.[9]
58. Cyberwarfare - Main article: Cyberwarfare
59. The U.S. Department of Defense (DoD) notes that the cyberspace has emerged as a national-level
60. concern through several recent events of geo-strategic significance. Among those are included, the
61. attack on Estonia's infrastructure in 2007, allegedly by Russian hackers. "In August 2008, Russia again
62. allegedly conducted cyberattacks, this time in a coordinated and synchronized kinetic and non-kinetic
63. campaign against the country of Georgia. Fearing that such attacks may become the norm in future
64. warfare among nation-states, the concept of cyberspace operations impacts and will be adapted by
65. warfighting military commanders in the future.
66. Computer as a target
67. These crimes are committed by a selected group of criminals. Unlike crimes using the computer as a tool,
68. these crimes require the technical knowledge of the perpetrators. As such, as technology evolves, so too does
69. the nature of the crime. These crimes are relatively new, having been in existence for only as long as
70. computers have—which explains how unprepared society and the world in general is towards combating
71. these crimes. There are numerous crimes of this nature committed daily on the internet:
72. Crimes that primarily target computer networks or devices include:
73. Computer viruses
74. Denial-of-service attacks
75. Malware (malicious code)
V
8 yıl
gtpa010 GPS MODÜLÜ nerden temin edebilirim ?
Üniversite öğrencisiyim bitirme ödevi için bisiklet takip sistemi yapıyoruz parçalara temin ettik fakat sadece gps modülü kaldı ali expressde bulunuyor malzeme fakat 1 aya anca gelir diyorlar bildiğiniz satın alabileceğim bir yer varmı ?
V
8 yıl
1800 liraya varan telefon tavsiyesi ?
LG G5 alınırmı ? daha iyi bir altarnatifi varmıdır ? n11 de 1800 liradan buldum güvenilirmidir ?
V
8 yıl
Ya bi yardım edin ölüyorum çok sıcak...
Odam boylu boyunca cam uzun bi oda sabah güneş doğar doğmaz benim odaya doğuyo sanki 11 e kadar cehennem odanın içi. Isı cam var 11 den sonrada kalıyor o ısı akşama kadar böyle buharlı vantilatör felan aldım ama hikaye klimada aylık ücreti yüzünden sıkıntı olucak gibi bana lütfen bi çıkar yol gösterin.
V
9 yıl
400-500 lira arası 480 gb ssd önerisi
Genelde yükleme ekranlarında sıkıntı çektiğim oyunları buraya koyucam ayrıca sistemi normal hddye kurup oyunları ssdden çalıştırsam aynı performansı sağlarmıyım ?
V
9 yıl
700-1300 tl arası monitör tavsiyesi
Bana 700-1300 tl civarı verdiğim paraya değicek 4k monitör önerebilirmisiniz ?
Bu gün a101 de HI-LEVEL smart tv gördüm 4 k, 1300tl mü ne fiyatı vardı onuda sormak isterim alınırmı monitör yerine ?

Birde kasamda display port var fazladan hdmi yanında bunuda kullanmak istiyorum önericeğiniz monitör dp yide destekelrse sevinirim.
DH Mobil uygulaması ile devam edin. Mobil tarayıcınız ile mümkün olanların yanı sıra, birçok yeni ve faydalı özelliğe erişin. Gizle ve güncelleme çıkana kadar tekrar gösterme.