Search
All categories
Results 1 - 20 of about 342
  • PC Assembly - Hard drive installation

    Hard drives, CD-ROM, DVD-ROM drives and floppy drive The motherboard usually has two IDE (Integrated Device Electronics) connectors: The first connector is known as the primary device controller; The second is known as the secondary... Read more

    Computer: assembly
    October 16, 2008 at 09:43 AM
  • PC assembly - Inserting expansion cards

    Inserting expansion cards Expansion cards are plugged into expansion slots. There are several types of slots: ISA slots run at 16 bits. Few computers still use this type of slot as the bus runs at a relatively slow speed. PCI slots run... Read more

    Computer: assembly
    October 16, 2008 at 09:43 AM
  • PC Assembly - Installing the processor

    The processor The processor is the computer's key integrated circuit which performs the main calculations. Processors come in various formats which can be grouped into two families: Socket processors Slot processors ZIF socket When... Read more

    Computer: assembly
    October 16, 2008 at 09:43 AM
  • How To Assemble a PC

    A PC is a modular type of computer that can be assembled using hardware components made by different manufacturers. This allows you to have a custom-built computer that matches your specific needs. This article will explain to you the... Read more

    Computer: assembly
    January 26, 2021 at 10:45 AM
  • PC Assembly - Getting the case ready

    Getting the casing ready When preparing to build a PC make sure to have the following: a phillips screwdriver, the necessary screws and the various cables and connectors. There are some simple guidelines that should be followed: Never... Read more

    Computer: assembly
    October 16, 2008 at 09:43 AM
  • Man in the middle attack

    ARP attack One of the most famous man in the middle attacks involves exploiting a weakness in the ARP (Address Resolution Protocol), the goal of which is to help find the IP address of a machine by knowing the physical address (MAC... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • SYN attack

    SYN attack The "SYN attack" (also called "TCP/SYN Flooding") is a network saturation (denial-of-service) attack that exploits the Three-way handshake mechanism of the TCP protocol. The three-way handshake is the way in which any... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Buffer overflow attacks

    Buffer overflow introduction "Buffer overflow" (sometimes called buffer overrun) attacks are designed to trigger arbitrary code execution by a program by sending it more data than it is supposed to receive. Programs that accept... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Denial of Service Attack

    What is ”denial of service attack” (DoS)? It is a type of attack that aims to make an organization's services or resources unavailable for an indefinite amount of time. Denial-of-service attacks are a hassle that can affect any company... Read more

    Attacks
    January 26, 2021 at 10:54 AM
  • Exploits

    Exploits An "exploit" is a computer program that "exploits" a vulnerability, whether or not it is published. Each exploit is specific to a version of an application as it exploits flaws in that version. There are various types of... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Man in the middle attack

    Man in the middle attack The "man in the middle" attack, sometimes abbreviated MITM, is an attack scenario where an attacker monitors a communication between two parties and falsifies the exchanges to impersonate one of the parties.... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • URL Manipulation Attacks

    The URL (Uniform Resource Locator) of a web application is the vector that makes it possible to indicate the requested resource. This article will show you how to protect yourself against URL manipulation attacks. The Essence of a URL... Read more

    Attacks
    January 26, 2021 at 10:39 AM
  • Security - Network intrusion methodology

    The goal of this article is to explain the methodology that pirates generally use to infiltrate a computer system. Its purpose is not to explain how to compromise a system but to help you understand how the process works so you can... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Passwords

    Passwords Attack methods Brute force cracking Dictionary attack Hybrid attack Choosing a password Password policies Multiple passwords Passwords When connecting to a computer system, you usually have to enter a log in or username and a... Read more

    Attacks
    November 12, 2012 at 12:41 PM
  • Replay Attack

    What is a replay attack? A replay attack is a network, a ”Man-in-the-middle" attack that involves intercepting data packets and replaying them. This means resending them as is (with no decryption) to the receiving server. Another common... Read more

    Attacks
    January 22, 2021 at 11:18 AM
  • Network analyzers (sniffers)

    Network analysis A "network analyzer" (also called a sniffer), is a device that makes it possible to "monitor" a network's traffic, that is, to capture information circulating on that network. On an unswitched network, data are sent to... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Assessment security and types of hackers

    What is a hacker? The term "hacker" is often used to refer to a computer pirate. Victims of piracy on computer networks like to think they have been attacked by experienced pirates who have carefully studied their system and developed... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • AAC (m4a)

    Introduction to AAC format AAC (Audio Advanced Coding) is an audio data compression format developed by the Fraunhofer Institute in cooperation with AT, Nokia, Sony and Dolby. As with the MP3 format, it's a form of compression which... Read more

    Audio
    October 16, 2008 at 09:43 AM
  • Dolby Digital (AC3)

    Launched in 1987, the Dolby Digital format is a digital audio encoding standard developed by Dolby Labs. Unlike Dolby ProLogic systems, Dolby Digital audio tracks are independent (the term "discrete" is also sometimes used). Format... Read more

    Audio
    January 15, 2021 at 04:49 AM
  • DTS

    DTS, Inc. (originally Digital Theater System) is a digital sound coding standard created by Universal Pictures. Compared with the Dolby Digital standard, DTS uses four times less compression and digitizes sound at 20 bits instead of 16.... Read more

    Audio
    January 27, 2021 at 05:23 AM

Subscribe To Our Newsletter!

The Best of CCM in Your Inbox

Subscribe To Our Newsletter!