All articles from Computing

    October 2022

    28 October
    27 October
    • How to save a webpage as a PDF on Mac: Chrome, Safari

      Safari is a web browser that comes already installed with Apple devices such as Macs, iPods, iPhones, and others. Using this browser you can easily save web pages in PDF format. It comes in handy if you want to save your important emails, favorite web pages, or articles that you would like to read later. This article will show you how to create PDF documents of web pages using Chrome or Safari.

    25 October
    • How to change the welcome message in Windows 7

      If you still use the Windows 7 operating system, you might wonder how to change the startup message. In this short article, we will explain how to have Windows 7 display a custom message at startup as a pop-up.

    • CPU overheating while gaming: how to fix it

      Overheating of the CPU caused by a temperature problem is definitely a bad sign, as it can destroy the processor and can cause instabilities in the hardware of the system. If you are experiencing a CPU that is overheating, this tutorial will introduce you to a few solutions.

    • Desktop icons missing Windows: 10, 7, after update

      Sometimes users will notice that their taskbar and desktop icons have gone missing. There are different methods of bringing back the desktop icons and taskbar on the computer screen. This article will guide you by showing 5 different methods to correct the problem.

    • Top apps to learn coding on your smartphone

      Thanks to modern technology, computer programming (a.k.a. coding) has become accessible to everybody, not just the computer whizzes amongst us. In the following 'How To' guide, we'll introduce a selection of 5 apps that take different approaches teaching you to code using just your smartphone. Even though an app cannot replace professional courses, they will enable the user to obtain a basic skill level and understanding of coding thanks to their fun exercises.

    21 October
    • All about digital data transmission: types of encoding

      Digital transmission is the sending of information over physical communication media in the form of digital signals. Analog signals must therefore be digitized first before being transmitted. The present article discusses in detail the different types of encoding.

    • What are the public WiFi risks?

      Today, there are more than ever digital professions, which has made having a good Internet connection a necessity. Moreover, even people whose work is not strongly related to the Web, need it on an everyday basis to check their emails or participate in online courses. However, it is also well known that there are public wifi risks but in fact, this is not the only risk factor when it comes to security. This article discusses in detail the risks related to WIFI.

    • What is a client/server environment: definition, example

      What is a client-server environment? Numerous applications run in a client-server architecture. This means that client computers (computers forming part of the network) contact a server that provides services to the client computers. These services are programs that provide data such as time, files, connection, etc.

    • What is a motherboard: definition, sizes, components

      What is and what does a motherboard do? The primary component of a computer is the motherboard (sometimes called the mainboard). The motherboard is the hub that is used to connect all of the computer's essential components. As its name suggests, the motherboard acts as a parent board, which takes the form of a large printed circuit with connectors for expansion cards, memory modules, the processor, etc.

    • All about DB25 connector: pins, male, female

      The DB25 (originally DE-25) connector is an analog 25-pin plug of the D-Subminiature connector family (D-Sub or Sub-D). The DB25 connector is mainly used for serial connections, allowing for asynchronous data transmission as provided by standard RS-232 (RS-232C). It is also used for parallel port connections and was used to connect printers, that's why it's also known as a printer port (LPT). DB25 serial ports on computers have male connectors, while parallel port connectors are DB25 female.

    • What is ASCII: chart, code, characters

      Computer memory saves all data in digital form. There is no way to store characters directly. Each character has its digital code equivalent: ASCII code (for American Standard Code for Information Interchange). Basic ASCII code represented characters as 7 bits (for 128 possible characters, numbered from 0 to 127). In the 1960s, the ASCII code was adopted as the new standard. With it, characters can be coded using 8 bits for 256 possible characters.

    • All about binary encoding: definition, decoder, encoder

      In the late 1930s, Claude Shannon showed that by using switches that close for "true" and open for "false," it was possible to carry out logical operations by assigning the number 1 to "true" and 0 for "false." This information encoding system is called binary. It's the form of encoding that allows computers to run. Binary uses two states (represented by the digits 0 and 1) to encode information. This article discusses binary data encoding. You can find a binary decoder and encoder online.

    20 October
    • What is 3-tier client/server architecture: example, diagram

      In client/server systems, there are several types of configurations. This article will get into detail of the client server architecture and more precisely, 2-tier architecture and 3-tier architecture. We also explain the differences and the similarities of the two systems.

    • How to make an RJ45 crossover cable: steps, tools

      A network card may have several types of connectors, with the most common being an RJ45 connector and a BNC connector (coaxial cable). In this article, we talk about the RJ45 ethernet crossover cable, as it is the most widely used.

    • What is the WiMAX technology: vs WiFi, LTE

      What is WiMAX? WiMAX stands for Worldwide Interoperability for Microwave Access. It is a metropolitan wireless standard created by Intel and Alvarion in 2002 and ratified by the IEEE (Institute of Electrical and Electronics Engineers) under the name IEEE-802.16. More precisely, WiMAX is the commercial designation that the WiMAX Forum gives to devices that conform to the IEEE 802.16 standard to ensure a high level of interoperability among them.

    19 October
    18 October
    17 October
    • How to run disc cleanup on Windows 8.1

      The Disk Cleanup utility allows you to free your computer from temporary and unnecessary files. To access the Disk Cleanup utility follow the procedure below.

    14 October
    13 October
    • What is a hard drive and how does it work?

      The hard drive is the component used to permanently store data instead of RAM, which is erased whenever the computer is restarted. This is why the term mass storage device is sometimes used to refer to hard drives. The hard drive is connected to the motherboard using a hard drive controller that acts as an interface between the processor and the hard drive. The hard drive controller manages the drives linked to it, interprets commands sent by the processor, and routes them to the drive.

    • What is the hub in network equipment: definition, usage

      What is a hub? A hub is a hardware element for centralizing network traffic from multiple hosts that also propagates the signal. It has several ports - enough to link machines to one another, usually 4, 8, 16, or 32. Its only goal is to recover binary data from a port and send it to all the other ports. The hub connects several machines, sometimes arranged in a star shape, which gives it its name because all communication from the machines on the network passes through it.

    • What is polymorphism: OOP, ad hoc, universal

      What is polymorphism in object oriented programming ? The word polymorphism comes from Greek and means having several different forms. This is one of the essential concepts of object-oriented programming. Where inheritance is related to classes and (their hierarchy), polymorphism is related to object methods.

    • All about different types of networks

      The generic term network refers to a group of entities (for example. objects, people, etc.) that are connected. A network, therefore, allows material or immaterial elements to be circulated among all of these entities based on well-defined rules. Depending on what kind of entity is involved, the term used will differ.

    12 October
    • Everything you need to know about data transmission modes

      A given transmission on a communication channel between two machines can occur in several different ways. The transmission is characterized by the direction of the exchanges, the transmission mode, or the number of bits sent simultaneously, and the synchronization between the transmitter and receiver.

    • How to change the Wi-Fi password: on Mac, Windows

      Knowing how to modify the name and password of your Wi-Fi connection is important for various reasons. The primary reason is that pre-established passwords are usually impossible to remember, a long and random collection of numbers and letters. The second is for security reasons: unwanted connections to your network and personal security as your network offers an access path to your data. In this article, we will explain how to change your Wi-Fi password step by step.

    11 October
    • Pick the right TV: for home, gaming, LCD, LED

      When selecting a new television, the number of options available can make the decision almost overwhelming. This article will provide you with the information you need to make an informed decision and will also give you some tips on how to increase the longevity of you

    • How to set the fastest Ubuntu download server

      Ubuntu uses hundreds of millions of servers worldwide to deliver updates to its global user base. The operating system will automatically choose a server based on your current location, yet the nearest server may not give you the quickest or most reliable access. This article explains how to change the Ubuntu download mirror.

    • Unable to connect to WiFi: encrypted with WPA

      Wifi Network security is meant to protect a wireless network from unauthorized access. Sometimes it happens that users cannot connect to a wifi network encrypted with WPA. The WPA encrypted Wifi Network asks for an authentication key before a connection can be made. If a valid key is provided and the user can still not connect to a wifi network encrypted with WPA, there could be a problem in the channel. Here's how to fix it.

    • Best apps to boost your WiFi signal

      Your WiFi signal at home sometimes does not work as well as we would like. This can be due to many reasons, from electromagnetic interference to objects that hinder the connection. To improve your WiFi signal, there are free applications that you can download to improve the signal quality. First, check out these tips.

    • Bluetooth: what is it, how does it works

      Bluetooth is a WPAN (Wireless Personal Area Network) technology, which is in other words, a wireless network technology with the capacity to link devices without a physical connection. Unlike infrared technology, Bluetooth-enabled devices do not need a direct line to communicate, allowing flexibility and connectivity of multiple devices.

    10 October
    7 October
    • "Open with" option not showing Windows 7: how to fix

      The "Open With" function is a very useful option to have as a Windows user, especially when opening unknown files. If however, your "open with" function has gone missing on Windows 7, do not worry as we will show you how to restore this feature in the article below.

    • Disable Intel Graphics shortcut keys

      If your computer is equipped with an Intel graphics card, there are several actions that can be performed simply by pressing the appropriate key combination. These actions are referred to as hot keys and include actions such as rotating your screen (using the Ctrl + Alt + Arrow keys). Although this feature proves to be a time saver for many users, if you have no use for hotkeys, here is a quick way to disable it.

    • Safely Remove Hardware icon missing in Windows

      In Windows, the Safely Remove Hardware tray icon is visible by default. If you have accidentally hidden it, or wish to reverse a conscious decision to get rid of it, this walkthrough may help you to restore it.

    6 October
    • Everything about different WiFi modes of operation

      Wireless adapters, or network interface controllers (NICs for short), are network cards with the 802.11 standards that let a machine connect to a wireless network. A station is any device that has such a card. Access points, also known as AP or hotspots, can let nearby WiFi-equipped stations access a wired network to which the access point is directly connected. The 802.11 standard defines two operating modes: infrastructure mode and ad hoc mode.

    • Everything about different types of networks: LAN, WAN, etc.

      Different types of private networks are distinguished based on their sizes (in terms of the number of machines), data transfer speeds, and reach. Private networks are networks that belong to a single organization. There are usually three categories of such networks: LAN, or local area network; MAN, or metropolitan area network; and WAN, or wide area network. There are also two other types of networks: TANs and CANs.

    • HTML document layout

      HyperText Markup Language (HTML) is based on the SGML (Standard Generalized Markup Language) metalanguage and is the format of the World Wide Web documents. An HTML page is a simple file containing text formatted with HTML tags. A web page can be built from even the most basic text editors, such as Notepad++. There are also HTML editors which display tags, attributes, and their values in different colors to make them easier to read.

    • Introduction to Wi-Fi (802.11 or WiFi)

      The IEEE 802.11 specification (ISO/IEC 8802-11) is an international standard describing the characteristics of a wireless local area network (WLAN). The name Wi-Fi (which stands for Wireless Fidelity, sometimes incorrectly shortened to WiFi) corresponds to the name of the certification given by the Wi-Fi Alliance, formerly WECA (Wireless Ethernet Compatibility Alliance). This group ensures compatibility between hardware devices that use the 802.11 standards. Read on to learn more.

    • How to fix GPU overheating: laptop, PC

      It can be very dangerous if your laptop or computer regularly faces the problem of overheating. This needs to be tackled immediately as it can compromise your safety. Some laptops and computers are more affected than others when powering on and off regularly. This article will explain how you can help stop your computer from overheating.

    • Disable Aero Windows 7

      Windows Aero is a design setting that gives your desktop windows a glass-like, or translucent look. When enabled, Aero creates a light-weight look and feel for your desktop, making your applications and windows easier to find and access. This article will explain how to turn Windows Aero on or off, depending on your preferences.

    5 October
    • Freebox "Router" mode

      It is possible to activate the "Router" mode (NAT) of the Freebox. The fFeebox will then act as a firewall and protect your computer against external itntrusion. It makes it easier to share the internet connection (if you have a hub or a switch on the Freebox V5). In this article we will show you how to configure "Router" mode of your Freebox.

    4 October
    3 October
    • Find your MAC address: on Windows 10, Linux, Mac

      A MAC address (Media Access Control address) is a 12-character identifier for your network adapter. In theory, it is unique for each network adapter, and the first half of the MAC address gives information about the manufacturer. Read on to find out how to find the MAC address on your device.

    • How to secure NetGear router: login, password

      The Wireless Netgear router is widely used but it poses security concerns. Securing this router can be a major concern because the IP, admin username, password and username are all stored in it. The below article has the default Netgear router address which must be secured from hackers. Read on for all the information and necessary steps on how to secure this router.

    • Windows CLIP command

      Under Windows, the CLIP command allows you to copy the results returned by a command in the DOS command prompt. This trick can be useful if you need to paste the results of the IPCONFIG command, for example, in a forum, it avoids the manual entry of all the data.

    • Security settings don't allow files to be dowloaded: fix

      Security settings are an integral part of computing. These settings guard against unauthorized access and protect against any kind of malware or virus attacks from the internet or external drives. It is essential to choose these security settings judiciously. Otherwise, day-to-day computer activities like downloading can be hindered. Follow this guide for a detailed explanation.

    • Windows 10 Pro vs. Home: What's the difference?

      While Windows 10 Home is intended for a casual use, Windows10 Pro will primarily be of interest to SMEs and professionals requiring access to specific administration or security features. What are the differences between Windows 10 Home and the Pro edition? Which edition of Windows 10 is right for you? All you need to know is in this article.

    • How to enable/disable firewall on Ubuntu

      The extremely popular Ubuntu operating system comes quipped with a built-in firewall technology. In this article we will show an easy way to enable/disable the firewall utility in Ubuntu.