Search
All categories
Results 61 - 81 of about 578
  • TCP session hijacking

    TCP session hijacking "TCP session hijacking" is a technique that involves intercepting a TCP session initiated between two machines in order to hijack it. In that the authentication check is performed only when opening the session, a ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Office Automation - Introduction

    What is office automation? Office suite tools What is office automation? The term office automation refers to all tools and methods that are applied to office activities which make it possible to process written, visual, and sound data in ... Read more

    Office software
    October 29, 2013 at 05:55 PM
  • WPAN (Wireless Personal Area Network)

    Wireless Personal Area Networks (WPAN) A wireless personal area network (WPAN for short) is a low-range wireless network which covers an area of only a few dozen metres. This sort of network is generally used for linking peripheral devices ... Read more

    Wireless
    October 16, 2008 at 09:43 AM
  • Data tampering attacks

    Most web application attacks involving soliciting a website with manually entered data to generate an unexpected context. Web application parameters The HTTP protocol, a communication protocol on the web, makes it possible to convey ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • CD, CD audio and CD-ROM

    The Compact Disc was invented by Sony and Philips in 1981 in order to serve as a high-quality compact audio storage device which allowed for direct access to digital sound tracks. It was officially launched in October 1982. In 1984, the ... Read more

    Computer
    October 7, 2012 at 02:35 PM
  • Declaring a style sheet (CSS)

    Declaring a style sheet Style sheets are not directly integrated into the W3C's HTML recommendations. For this reason, you need to include elements in the HTML code indicating both the type of document, meaning the version of the HTML and ... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • Quality Organization

    Quality Organization Establishing a quality procedure is a comprehensive business project that requires the participation of all employees. Therefore, it is necessary to define a "quality organization" that fits into and hinges on the ... Read more

    Quality
    November 12, 2012 at 03:20 PM
  • OOP - Polymorphism

    Definition of polymorphism The word polymorphism comes from Greek and means having several different forms. This is one of the essential concepts of object-oriented programming. Where inheritance is related to classes and (their hierarchy ... Read more

    Object-Oriented Programming
    October 16, 2008 at 09:43 AM
  • RTP/RTCP protocols

    Document written by Nico VanHaute, Julien Barascud and Jean-Roland Conca Introduction: What are RTP and RTCP? The spread of computers, added to the availability of cheap audio/video computer hardware, and the availability of higher ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • Passwords

    Passwords Attack methods Brute force cracking Dictionary attack Hybrid attack Choosing a password Password policies Multiple ... Read more

    Attacks
    November 12, 2012 at 12:41 PM
  • Telnet protocol

    Introduction to the Telnet protocol The Telnet protocol is a standard internet protocol enabling terminals and applications to interface over the Internet. This protocol provides the basic rules making it possible to link a client (system ... Read more

    Internet (protocols)
    October 29, 2012 at 03:45 PM
  • Computer screen or monitor

    Introduction to computer monitors A monitor (or screen) is a computer display unit. There are generally said to be two families of monitors: Cathode-ray tube monitors (or CRT for short), which are used with most desktop computers. They are ... Read more

    Computer
    November 1, 2012 at 04:17 PM
  • Processor

    Introduction Operation Instructions Registers Cache Memory Control Signals Functional Units Transistor Integrated Circuits Families Instruction Set CISC ... Read more

    Computer
    August 21, 2013 at 12:56 AM
  • Network equipment - Bridges

    Bridges A bridge is a hardware device for linking two networks that work with the same protocol. Unlike a repeater, which works at the physical level, a bridge works at the logical level (on layer 2 in the OSI model), which means that it ... Read more

    Local Area Network
    October 16, 2008 at 09:43 AM
  • The GSM standard

    Introduction to the GSM standard The GSM (Global System for Mobile communications) network is, at the start of the 21st century, the most commonly used mobile telephony standard in Europe. It is a so-called "second generation" (2G) ... Read more

    Mobile phones
    October 16, 2008 at 09:43 AM
  • Introduction to Windows NT

    Introduction to Microsoft Windows NT Windows NT (for "New Technology") is a 32-bit operating system developed by Microsoft. Windows NT's outward appearance makes it look a lot like Windows 95/98/Millennium, but Windows NT has a separately ... Read more

    Windows NT (XP,Vista,...)
    October 16, 2008 at 09:43 AM
  • ISP - Internet service providers

    What does ISP mean? ISP literally means Internet service provider or provider. It is a service (most of the time paid for) which allows you to connect to the Internet. Why use an ISP? Unless you have a specialized line (other than a ... Read more

    Internet Utilities
    October 16, 2008 at 09:43 AM
  • Terms of Use for CCM.net

    Preface These terms of use have been written in order to inform users of the site of its conditions of use, in particular for using of communications services (such as the bulletin board) which let users the world over, ... Read more

    Terms of Use
    June 13, 2016 at 11:49 AM
  • Smileys (emoticons)

    Why smileys? When typing words on the Internet, it's not always easy to convey feelings, emotions, or concepts like humor to the people you're communicating with. Here's a simple tip for getting the right message across: Use ASCII ... Read more

    World Wide Web
    October 16, 2008 at 09:43 AM
  • ASCII Code

    Data coding What is ASCII code? ASCII Character Chart Extended ASCII Character Chart EBCDIC code Unicode Data coding Morse code was the first code used for long-distance communication. Samuel F.B. Morse invented it in 1844. This code is ... Read more

    Encoding
    November 12, 2012 at 12:40 PM