Search
All categories
Results 121 - 145 of about 578
  • Network equipment - Bridges

    Bridges A bridge is a hardware device for linking two networks that work with the same protocol. Unlike a repeater, which works at the physical level, a bridge works at the logical level (on layer 2 in the OSI model), which means that it ... Read more

    Local Area Network
    October 16, 2008 at 09:43 AM
  • Data transmission - Multiplexing

    Introduction to multiplexing Multiplexing refers to the ability to transmit data coming from several pairs of equipment (transmitters and receivers) called low-speed channels on a single physical medium (called the high-speed channel). ... Read more

    Data transmission
    October 16, 2008 at 09:43 AM
  • Network tests and diagnostics

    Testing the IP configuration Before doing anything else, you are advised to check the computer's IP configuration. Windows systems offer a command-line tool, called ipconfig, that lets you find out your computer's IP configuration. The ... Read more

    Network configuration
    October 16, 2008 at 09:43 AM
  • Computer graphics

    The field of the IT concerning the creation and the handling of digital images is called computer graphics. Computer graphics cover various areas of knowledge, including the representation of graphic elements (text, image or video), as well ... Read more

    Video
    October 16, 2008 at 09:43 AM
  • Data compression

    Why compress data? Nowadays, the computing power of processors increases more quickly than storage capacities, and is much faster than network band-widths, because this requires enormous changes in the telecommunication infrastructures. ... Read more

    Video
    October 16, 2008 at 09:43 AM
  • Copyright Information

    Legal Notice Creative Commons Deed CCM's Creative Commons License Deed V3.0 Attribution - NonCommercial - ShareAlike 3.0 France You are free: to copy, distribute, display, and perform the work to make derivative works Under the following ... Read more

    Terms of Use
    June 13, 2016 at 11:37 AM
  • The HTTP protocol

    Introduction to the HTTP protocol Since 1990 HTTP protocol (HyperText Transfer Protocol) has been the most widely used protocol on the Internet. Version 0.9 was only intended to transfer data over the Internet (in particular Web pages ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • zlclient - zlclient.exe

    zlclient - zlclient.exe zlclient.exe (zlclient stands for Zone Labs Client) is a process which corresponds to the firewall ZoneAlarm. It is an application which can safely be terminated. However, it is recommended that you not do so, in ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • Intrusion Test

    Intrusion Test Intrusion tests (abbreviated as pen tests) consist in testing an information system's protection methods by subjecting the system to a real situation. Two methods are generally used: The black box method that consists of ... Read more

    Security
    October 16, 2008 at 09:43 AM
  • Using Telnet

    Introduction to Telnet Protocols and implementation Running Telnet Commands in Telnet Introduction to Telnet Telnet is a protocol for emulating a remote terminal, which means that it can be used to run commands entered on a keyboard at a ... Read more

    Internet Utilities
    November 12, 2012 at 12:39 PM
  • DBMS models

    The various database models Databases appeared in the late 1960s, at a time when the need for a flexible information management system had arisen. There are five models of DBMS, which are distinguished based on how they represent the data ... Read more

    Databases
    October 16, 2008 at 09:43 AM
  • DB9 connector

    DB9 connector The DB9 (originally DE-9) connector is an analog 9-pin plug of the D-Subminiature connector family (D-Sub or Sub-D). The DB9 connector is mainly used for serial connections, allowing for the asynchronous transmission of data ... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • Agile Methods (RAD, XP)

    Agile methods "Agile methods" software development (also called Agile Modelling denoted AG for short) reduce software lifecycle time (thus speeding up development) by firstly developing a prototype version, then integrating functionality ... Read more

    Software engineering
    October 16, 2008 at 09:43 AM
  • Telnet protocol

    Introduction to the Telnet protocol The Telnet protocol is a standard internet protocol enabling terminals and applications to interface over the Internet. This protocol provides the basic rules making it possible to link a client (system ... Read more

    Internet (protocols)
    October 29, 2012 at 03:45 PM
  • msconfig - msconfig.exe

    msconfig - msconfig.exe msconfig.exe (msconfig) is a standard process in Windows XP (and earlier versions of Windows) for editing the startup configuration. MsConfig is mainly used for removing processes loaded when Windows is booted. How ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • Vulnerability scanners - Port scanning

    Port scanning A "vulnerability scanner" (sometimes called a "network analyzer") is a utility program that makes it possible to perform a security audit on a network by scanning for open ports on a given machine or an entire network. The ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Network topologies

    What does "topology" mean? Bus topology Star topology Ring topology What does "topology" mean? A computer network is made of computers which are linked to one another with communication lines (network cables, etc.) and hardware elements ( ... Read more

    Introduction to Networks
    October 29, 2013 at 04:28 PM
  • Environment variables

    Environment variables An environment variable is a dynamic value loaded into the memory that can be used by several processes operating simultaneously. On most operating systems, the location of some libraries or of the main system ... Read more

    Operating System
    October 16, 2008 at 09:43 AM
  • Web server attacks

    Vulnerability of web services The first network attacks exploited vulnerabilities related to the implementation of TCP/IP protocol suites. With the gradual correction of these vulnerabilities, attacks have shifted to application layers and ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Cryptography - The SET protocol

    Introduction to SET SET (Secure Electronic Transaction) is a protocol that was developed by Visa and MasterCard and that uses the SSL standard. SET is based on the use of an electronic signature from the buyer and a transaction involving ... Read more

    Cryptography
    October 16, 2008 at 09:43 AM