All categories
Results 121 - 145 of about 578
  • ATA, IDE and EIDE

    Overview The ATA (Advanced Technology Attachment) standard is a standard interface that allows you to connect storage peripherals to PC computers. The ATA standard was developed on May 12, 1994 by the ANSI (document X3.221-1994). Despite ... Read more

    April 24, 2009 at 06:55 AM
  • ntvdm - ntvdm.exe

    ntvdm - ntvdm.exe ntvdm.exe (Windows 16-bit Virtual Machine) is a Windows NT/2000/XP generic process used for providing a 16-bit environment for old 16-bit applications. The process ntvdm is not in any way a virus, a worm, a Trojan horse, ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • Introduction to DOS

    The development of MS-DOS MS-DOS is the most well known operating system, the most commercialised version is that of Microsoft, christened "MS-DOS" (there are other versions such as DR-DOS). MS-DOS was created in 1981 when it was used on ... Read more

    MS Dos
    October 16, 2008 at 09:43 AM
  • DB9 connector

    DB9 connector The DB9 (originally DE-9) connector is an analog 9-pin plug of the D-Subminiature connector family (D-Sub or Sub-D). The DB9 connector is mainly used for serial connections, allowing for the asynchronous transmission of data ... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • Network equipment - The hub

    What is a hub? A hub is an element of hardware for centralising network traffic coming from multiple hosts, and to propagate the signal. The hub has a certain number of ports (it has enough ports to link machines to one another, usually 4, ... Read more

    Local Area Network
    October 16, 2008 at 09:43 AM
  • The Sasser worm

    Introduction to the Sasser virus Appearing in May 2004, the Sasser virus (also known as the W32/Sasser.worm, W32.Sasser.Worm, Worm.Win32.Sasser.a, Worm.Win32.Sasser.b or Win32.Sasser) is a virus which exploits a security hole in the LSASS ... Read more

    Viruses and threats
    October 16, 2008 at 09:43 AM
  • Agile Methods (RAD, XP)

    Agile methods "Agile methods" software development (also called Agile Modelling denoted AG for short) reduce software lifecycle time (thus speeding up development) by firstly developing a prototype version, then integrating functionality ... Read more

    Software engineering
    October 16, 2008 at 09:43 AM
  • The USB (Universal Serial Bus)

    Introduction to the USB USB (Universal Serial Bus) is as its name suggests, based on serial type architecture. However, it is an input-output interface much quicker than standard serial ports. Serial architecture was used for this type of ... Read more

    October 16, 2008 at 09:43 AM
  • PS/2 connector

    PS/2 connector The PS/2 connector (mini-DIN6 format) is mainly used to connect computers to keyboards and mice. ... Read more

    Cables and connectors
    November 10, 2010 at 08:57 AM
  • HTML document layout

    HTML document An HTML page is a simple file containing text formatted with HTML tags. Traditionally, the file is given an .htm or .html extension, but a web page may have other extensions as well. A web page can be built from even the most ... Read more

    October 16, 2008 at 09:43 AM
  • VPN - Virtual Private Networks

    The concept of virtual private networks Operation of a VPN Tunneling protocols The PPTP protocol The L2TP protocol The IPSec protocol The concept of virtual private networks Local area networks (LANs) are the internal networks of ... Read more

    Introduction to Networks
    November 12, 2012 at 12:44 PM
  • DVD, DVD audio and DVD-ROM (DVD-R, DVD-RW, DVD+W, DVD+RW)

    Introduction to the DVD format Physical structure Standard DVD formats Standard DVD recording formats DVD-R/RW DVD+R/RW Difference between DVD+ and DVD- DVD DL Logical structure File and folder system Structure of a video DVD Regions ... Read more

    October 7, 2012 at 02:35 PM
  • zlclient - zlclient.exe

    zlclient - zlclient.exe zlclient.exe (zlclient stands for Zone Labs Client) is a process which corresponds to the firewall ZoneAlarm. It is an application which can safely be terminated. However, it is recommended that you not do so, in ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • Using Telnet

    Introduction to Telnet Protocols and implementation Running Telnet Commands in Telnet Introduction to Telnet Telnet is a protocol for emulating a remote terminal, which means that it can be used to run commands entered on a keyboard at a ... Read more

    Internet Utilities
    November 12, 2012 at 12:39 PM
  • Introduction to Trojan horses

    Trojan horses A Trojan horse is a computer program which carries out malicious operations without the user's knowledge. The name "Trojan horse" comes from a legend told in the Iliad (by the writer Homer) about the siege of the city of Troy ... Read more

    Viruses and threats
    July 25, 2012 at 11:39 AM
  • Cryptography - Secure Sockets Layers (SSL)

    Introduction to SSL SSL (Secure Sockets Layers) is a process that manages the security of transactions made on the Internet. The SSL standard was developed by Netscape, together with Mastercard, Bank of America, MCI and Silicon Graphics. ... Read more

    October 16, 2008 at 09:43 AM
  • Linking two PCs with a null modem cable

    Linking two computers without network cards The best way to link two computers is to use an RJ45 cable to connect the machines' network cards. However, when one or both of the computers has no network card, there is still a fairly easy way ... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • Introduction to setting up an intranet

    Status of this document This document explaining how to set up an intranet on a machine running Linux has been made possible through a partnership with, whose webmaster (Michel Maudet) is the author of the original document. ... Read more

    October 16, 2008 at 09:43 AM
  • Information systems director (ISD)

    Information systems director (ISD) An information systems director (also called an IS director) has both managing and technical skills. He/she is in charge of bringing information systems in line with the company's plans, setting and ... Read more

    IT professions
    October 16, 2008 at 09:43 AM
  • Read-only memory (ROM)

    Read-only memory (ROM) There is a type of memory that stores data without electrical current; it is the ROM (Read Only Memory) or is sometimes called non-volatile memory as it is not erased when the system is switched off. This type of ... Read more

    November 1, 2012 at 04:15 PM