Search
All categories
Results 1 - 21 of about 579
  • Structure of an Email (Headers and Bodies)

    An email has three basic parts. The first is the header, a set of lines containing ... Read more

    Email
    June 14, 2018 at 01:55 AM
  • WiFi Modes of Operation (802.11 or Wi-Fi)

    There are several kinds of hardware that may be used to implement a WiFi wireless network, including wireless adapters and access points. Wireless adapters, or network interface controllers (NICs for short), are network cards with the 802. ... Read more

    Wifi
    June 17, 2018 at 06:55 PM
  • How Email Works (MTA, MDA, MUA)

    As simple as it is to use, email relies on a more complicated set of operating procedures ... Read more

    Email
    June 17, 2018 at 05:44 PM
  • Partitioning a Hard Drive for Mac, Windows, and Linux

    Partitioning is the process of writing the hard drive sectors that will make up the partition table. It contains information on the partition, including sector size, position with respect to the primary partition, types of partitions ... Read more

    Computer: maintenance
    May 23, 2018 at 06:20 PM
  • Replay attack

    Replay attack "Replay" attacks are "Man in the middle" attacks that involve intercepting data packets and replaying them, that is, resending them as is (with no decryption) to the receiving server. As a result, depending on the context, ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Data transmission - Digital data transmission

    Introduction to digital transmission Digital transmission is the sending of information over a physical communications media in the form of digital signals. Analogue signals must therefore be digitised first before being transmitted. ... Read more

    Data transmission
    February 6, 2018 at 05:42 AM
  • PPP and SLIP Protocols

    The majority of people in the world, not having lines (cable or Ethernet) linked directly to the Internet, must use telephone lines, the most widely used network, to connect to the Internet. The connection is made using a modem, a device ... Read more

    Internet (protocols)
    June 22, 2018 at 02:01 AM
  • Introduction to e-Commerce (Electronic Commerce)

    The term Electronic commerce (or e-Commerce) refers to the use of an electronic medium to ... Read more

    e-Business
    July 10, 2018 at 06:07 AM
  • The Concept of Networks

    The generic term network refers to a group of entities (i.e. objects, people, etc.) that are connected to one another. A network, therefore, allows material or immaterial elements to be circulated among all of these entities, based on well- ... Read more

    Introduction to Networks
    August 3, 2018 at 10:12 AM
  • Spreadsheet - Formulas

    Introduction to Formulas The main use of a spreadsheet is to automate calculations, which means using cells to perform operations based on values in other cells. The spreadsheet recalculates all the values each time a change is made to the ... Read more

    Spreadsheet
    March 15, 2018 at 03:55 PM
  • Types of Networks

    Different types of private networks are distinguished based on their sizes (in terms of the number of machines), their data transfer speeds, and their reach. Private networks are networks that belong to a single organization. There are ... Read more

    Introduction to Networks
    June 14, 2018 at 01:48 AM
  • URL Manipulation Attacks

    The URL (Uniform Resource Locator) of a web application is the vector that makes it possible to indicate the requested resource. This article will show you how to protect yourself against URL manipulation attacks. ... Read more

    Attacks
    June 19, 2018 at 06:25 PM
  • Networking: 3-Tier Client/Server Architecture

    In client/server systems, there are several types of configurations. This article will get into 2-tier architecture and 3-tier architecture and explain the differences and the similarities of the two systems. ... Read more

    Client/Server
    June 17, 2018 at 06:04 PM
  • Denial of service attack

    Introduction to denial-of-service attacks A "denial-of-service attack" (abbreviated DoS) is a type of attack that aims to make an organization's services or resources unavailable for an indefinite amount of time. Most of the time, these ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Computer Bus - What Is It?

    In computing, a bus is defined as a set of physical connections (i.e. cables, printed circuits, etc.), which can be shared by multiple hardware components in order to communicate with one another. The purpose of buses is to reduce the ... Read more

    Computer
    June 17, 2018 at 06:17 PM
  • Introduction to email

    What is email? Electronic mail (also known as email or e-mail) is one of the most commonly used services on the Internet, allowing people to send messages to one or more recipients. Email was invented by Ray Tomlinson in 1972. Why use ... Read more

    Email
    October 16, 2008 at 09:43 AM
  • Introduction to Encryption with DES

    On May 15, 1973, the NBS (National Bureau of Standards, now called NIST (National Institute of Standards and Technology) published a request in the Federal Register for an encryption algorithm that would meet the following criteria: have a ... Read more

    Cryptography
    June 19, 2018 at 07:09 PM
  • Data Transmission - Transmission Modes

    A given transmission on a communications channel between two machines can occur in several different ways. The transmission is characterized by: tthe direction of the exchanges; the transmission mode, or the number of bits sent ... Read more

    Data transmission
    June 17, 2018 at 06:38 PM
  • Serial Port and Parallel port

    Every computer is built with tons of different ports that perform various functions. Two of ... Read more

    Computer
    June 22, 2018 at 01:09 AM
  • Binary Encoding

    In the late 1930s, Claude Shannon showed that by using switches which that close for "true" and open for "false," it was possible to carry out logical operations by assigning the number 1 to "true" and 0 for "false." This information ... Read more

    Encoding
    June 19, 2018 at 07:24 PM