Search
All categories
Results 121 - 149 of about 578
  • E-mail bombing

    E-mail Bombing E-mail bombing involves sending several thousand identical messages to an electronic mailbox in order to overflow it. E-mails are stored on a messaging server until they are picked up by the owner of the messaging account. ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Network equipment - The hub

    What is a hub? A hub is an element of hardware for centralising network traffic coming from multiple hosts, and to propagate the signal. The hub has a certain number of ports (it has enough ports to link machines to one another, usually 4, ... Read more

    Local Area Network
    October 16, 2008 at 09:43 AM
  • The Printer

    Printers Characteristics Daisy Wheel Printer Dot-Matrix Printer Inkjet Printer and Bubble Jet Printer Laser Printer LED Printer Printer Command Language Print Servers Printers The printer is a peripheral that allows you to make a print-out ... Read more

    Computer
    November 7, 2012 at 08:26 AM
  • Web server attacks

    Vulnerability of web services The first network attacks exploited vulnerabilities related to the implementation of TCP/IP protocol suites. With the gradual correction of these vulnerabilities, attacks have shifted to application layers and ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Conducting a meeting

    Introduction Meetings are a way of sharing, within a group of individuals, the same level of knowledge of a subject or a problem and of making decisions collectively. Additionally, decisions made collectively, with representatives of the ... Read more

    Project management
    October 16, 2008 at 09:43 AM
  • DBMS models

    The various database models Databases appeared in the late 1960s, at a time when the need for a flexible information management system had arisen. There are five models of DBMS, which are distinguished based on how they represent the data ... Read more

    Databases
    October 16, 2008 at 09:43 AM
  • Network tests and diagnostics

    Testing the IP configuration Before doing anything else, you are advised to check the computer's IP configuration. Windows systems offer a command-line tool, called ipconfig, that lets you find out your computer's IP configuration. The ... Read more

    Network configuration
    October 16, 2008 at 09:43 AM
  • History of the Internet

    The revolutionary idea In 1962, as Communism grew stronger, the US Air Force asked a small team of researchers to create a military communications network that could withstand a nuclear strike. The concept of this network relied on a ... Read more

    Computer history
    October 16, 2008 at 09:43 AM
  • Execution phase of a project

    Execution phase Preparation Before beginning the execution of the work, it is necessary to take the time to break the project down into tasks in order to plan the performance of these tasks and determine what resources need to be mobilized ... Read more

    Project management
    October 16, 2008 at 09:43 AM
  • Partition - Partitioning a hard drive

    What is a partition? The partitioning of a hard drive occurs after the drive has been physically formatted but before it is logically formatted. It involves creating areas on the disk where data will not be mixed. It can be used, for ... Read more

    Computer: maintenance
    April 28, 2009 at 06:04 AM
  • Introduction to Windows NT

    Introduction to Microsoft Windows NT Windows NT (for "New Technology") is a 32-bit operating system developed by Microsoft. Windows NT's outward appearance makes it look a lot like Windows 95/98/Millennium, but Windows NT has a separately ... Read more

    Windows NT (XP,Vista,...)
    October 16, 2008 at 09:43 AM
  • Agile Methods (RAD, XP)

    Agile methods "Agile methods" software development (also called Agile Modelling denoted AG for short) reduce software lifecycle time (thus speeding up development) by firstly developing a prototype version, then integrating functionality ... Read more

    Software engineering
    October 16, 2008 at 09:43 AM
  • The USB (Universal Serial Bus)

    Introduction to the USB USB (Universal Serial Bus) is as its name suggests, based on serial type architecture. However, it is an input-output interface much quicker than standard serial ports. Serial architecture was used for this type of ... Read more

    Computer
    October 16, 2008 at 09:43 AM
  • Connecting the computer to a HIFI sound system

    Why connect a computer to a sound system? These days, computers provide sound quality that is as good as hifi sound systems. It is possible to use them to listen to music, in particular thanks to mp3 files that provide sound quality that ... Read more

    Practical notes
    October 16, 2008 at 09:43 AM
  • Introduction to power line communications (PLC)

    Introduction to PLC "Power Line Communications" basically means any technology that enables data transfer at narrow or broad band speeds through power lines by using advanced modulation technology. Depending on the country, the institution ... Read more

    Power Line Communications
    October 16, 2008 at 09:43 AM
  • Introduction to IT Security

    As Internet use is developing, more and more companies are opening their information system to their partners and suppliers. Therefore, it is essential to know which of the company's resources need protecting and to control system access ... Read more

    Security
    October 16, 2008 at 09:43 AM
  • Introduction to UNIX systems

    The UNIX system The Unix system is a multi-user, multi tasking operating system which means that it allows a single or multiprocessor computer to simultaneously execute several programs by one or several users. It has one or several ... Read more

    UNIX
    October 16, 2008 at 09:43 AM
  • MAN (Metropolitan Area Network)

    Metropolitan Area Network (MAN) MANs (Metropolitan Area Networks) connect multiple geographically nearby LANs to one another (over an area of up to a few dozen kilometres) at high speeds. Thus, a MAN lets two remote nodes communicate as if ... Read more

    Introduction to Networks
    October 16, 2008 at 09:43 AM
  • Using Telnet

    Introduction to Telnet Protocols and implementation Running Telnet Commands in Telnet Introduction to Telnet Telnet is a protocol for emulating a remote terminal, which means that it can be used to run commands entered on a keyboard at a ... Read more

    Internet Utilities
    November 12, 2012 at 12:39 PM
  • Intrusion detection systems (IDS)

    Introduction to intrusion detection systems An IDS (Intrusion Detection System) is the term for a mechanism which quietly listens to network traffic in order to detect abnormal or suspicious activity, thereby reducing the risk of intrusion ... Read more

    Intrusion detection
    October 16, 2008 at 09:43 AM