Welcome to CCM! We are France's number one tech website (CommentCaMarche.net). Every day, millions of users ... Read more
Preface Scope Moderation Guidelines Legal Aspects Neutrality Respect for Others Advice for Writing Messages ... Read more
TCP session hijacking "TCP session hijacking" is a technique that involves intercepting a TCP session initiated between two machines in order to hijack it. In that the authentication check is performed only when opening the session, a ... Read more
Why set up a local area network? When you have several computers, it can be convenient to connect them to each other to create a local area network (LAN). Setting up such a network costs very little, contrary to what people may think. Here ... Read more
The Concept of Ergonomics Ergonomics is the use of scientific knowledge about humans (psychology, physiology, medicine) with the aim of improving the workplace environment. Ergonomics is generally characterized by two components: ... Read more
The principle of NAT Network address translation or NAT was developed in order to respond to the shortage of IP addresses with IPv4 protocol (in time the IPv6 protocol will respond to this problem). In fact, in IPv4 addressing the number ... Read more
zlclient - zlclient.exe zlclient.exe (zlclient stands for Zone Labs Client) is a process which corresponds to the firewall ZoneAlarm. It is an application which can safely be terminated. However, it is recommended that you not do so, in ... Read more
Agile methods "Agile methods" software development (also called Agile Modelling denoted AG for short) reduce software lifecycle time (thus speeding up development) by firstly developing a prototype version, then integrating functionality ... Read more
Introduction to motherboards Characteristics Motherboard form factor Integrated components The chipset The CMOS ... Read more
Third-party application maintenance The term third-party application maintenance (acronym TMA) refers to outsourcing the maintenance of applications, i.e. entrust all or part of the maintenance of applications to a third-party computer ... Read more
Why smileys? When typing words on the Internet, it's not always easy to convey feelings, emotions, or concepts like humor to the people you're communicating with. Here's a simple tip for getting the right message across: Use ASCII ... Read more
Scams A "scam" is a fraudulent practice of African origin that involves extorting funds from internet users by enticing them with a sum of money and promising them a share of it. The use of scams originated in Nigeria, which has also given ... Read more
Netiquette Netiquette (a contraction of the words "Net" and "etiquette") refers to the set of rules governing correct behavior on the Internet, in order to respect others and be respected in turn. They serve as guidelines for civility and ... Read more
Classes and IDs Classes A web designer might want to assign different styles to the same tags. For this reason, the CSS specifications introduced the concept of classes. The definition of classes is as simple as that of styles. It involves ... Read more
Introduction to Vi Despite its very limited ergonomics, Vi i is one of the most popular text editors texte under Unix type systems (with Emacs and pico). Under Linux, there is a free version of Vi called Vim (Vi Improved). Vi (pronounced ... Read more
What is a network card? What is the role of a network card? Preparing data The role of the identifier Other ... Read more
The Concept of Interrupts DMA Base Addresses Hardware Conflicts IRQ Configuration Resolving Hardware Conflicts The Concept of Interrupts Because the processor cannot simultaneously process several pieces of information (it processes one ... Read more
Advantages File sharing involves making the content of one or more directories available through the network. All Windows systems have standard devices making it easy to share the content of a directory. However, file sharing may lead to ... Read more
Substitution cipher Substitution cipher involves replacing one or more entities (generally letters) in a message with one or more other entities. There are several types of substitution cryptosystems: Monoalphabetic substitution involves ... Read more
The development of MS-DOS MS-DOS is the most well known operating system, the most commercialised version is that of Microsoft, christened "MS-DOS" (there are other versions such as DR-DOS). MS-DOS was created in 1981 when it was used on ... Read more