150
edits
Heatherpedia (talk | contribs) |
Heatherpedia (talk | contribs) |
||
Line 219: | Line 219: | ||
It's important to understand the '''dangers''' of subscribing to Ubiquity commands from sites that you don't trust. Since a Ubiquity command can do anything, and it has full access to your web browser, a bad person could write a Ubiquity command to steal your personal information or do malicious things to your computer. You should not install Ubiquity commands unless you are confident that the source is trustworthy. | It's important to understand the '''dangers''' of subscribing to Ubiquity commands from sites that you don't trust. Since a Ubiquity command can do anything, and it has full access to your web browser, a bad person could write a Ubiquity command to steal your personal information or do malicious things to your computer. You should not install Ubiquity commands unless you are confident that the source is trustworthy. | ||
== Finding New Ubiquity Commands == | |||
TODO: Add information about the herd here. |
edits