Search
All categories
Results 81 - 108 of about 579
  • CCM - Who We Are

    Welcome to CCM! We are France's number one tech website (CommentCaMarche.net). Every day, millions of users ... Read more

    About Us
    November 15, 2018 at 04:13 AM
  • Terms of Use for CCM

    Preface Scope Moderation Guidelines Legal Aspects Neutrality Respect for Others Advice for Writing Messages ... Read more

    Terms of Use
    May 31, 2018 at 07:24 AM
  • TCP session hijacking

    TCP session hijacking "TCP session hijacking" is a technique that involves intercepting a TCP session initiated between two machines in order to hijack it. In that the authentication check is performed only when opening the session, a ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Creating a local area network

    Why set up a local area network? When you have several computers, it can be convenient to connect them to each other to create a local area network (LAN). Setting up such a network costs very little, contrary to what people may think. Here ... Read more

    Network configuration
    October 16, 2008 at 09:43 AM
  • Webmastering - Website Ergonomics

    The Concept of Ergonomics Ergonomics is the use of scientific knowledge about humans (psychology, physiology, medicine) with the aim of improving the workplace environment. Ergonomics is generally characterized by two components: ... Read more

    Webmastering
    October 16, 2008 at 09:43 AM
  • NAT- Network address translation, port forwarding and port trigg

    The principle of NAT Network address translation or NAT was developed in order to respond to the shortage of IP addresses with IPv4 protocol (in time the IPv6 protocol will respond to this problem). In fact, in IPv4 addressing the number ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • zlclient - zlclient.exe

    zlclient - zlclient.exe zlclient.exe (zlclient stands for Zone Labs Client) is a process which corresponds to the firewall ZoneAlarm. It is an application which can safely be terminated. However, it is recommended that you not do so, in ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • Agile Methods (RAD, XP)

    Agile methods "Agile methods" software development (also called Agile Modelling denoted AG for short) reduce software lifecycle time (thus speeding up development) by firstly developing a prototype version, then integrating functionality ... Read more

    Software engineering
    October 16, 2008 at 09:43 AM
  • Motherboard

    Introduction to motherboards Characteristics Motherboard form factor Integrated components The chipset The CMOS ... Read more

    Computer
    November 12, 2012 at 12:49 PM
  • TMA (Third-Party Application Maintenance)

    Third-party application maintenance The term third-party application maintenance (acronym TMA) refers to outsourcing the maintenance of applications, i.e. entrust all or part of the maintenance of applications to a third-party computer ... Read more

    e-Business
    October 16, 2008 at 09:43 AM
  • Smileys (emoticons)

    Why smileys? When typing words on the Internet, it's not always easy to convey feelings, emotions, or concepts like humor to the people you're communicating with. Here's a simple tip for getting the right message across: Use ASCII ... Read more

    World Wide Web
    October 16, 2008 at 09:43 AM
  • E-mail scams - Fund transfer scams

    Scams A "scam" is a fraudulent practice of African origin that involves extorting funds from internet users by enticing them with a sum of money and promising them a share of it. The use of scams originated in Nigeria, which has also given ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Rules for proper email use

    Netiquette Netiquette (a contraction of the words "Net" and "etiquette") refers to the set of rules governing correct behavior on the Internet, in order to respect others and be respected in turn. They serve as guidelines for civility and ... Read more

    Email
    October 16, 2008 at 09:43 AM
  • Style classes (CSS)

    Classes and IDs Classes A web designer might want to assign different styles to the same tags. For this reason, the CSS specifications introduced the concept of classes. The definition of classes is as simple as that of styles. It involves ... Read more

    CSS
    October 16, 2008 at 09:43 AM
  • Linux - The Vi editor

    Introduction to Vi Despite its very limited ergonomics, Vi i is one of the most popular text editors texte under Unix type systems (with Emacs and pico). Under Linux, there is a free version of Vi called Vim (Vi Improved). Vi (pronounced ... Read more

    Linux
    October 16, 2008 at 09:43 AM
  • Network cards

    What is a network card? What is the role of a network card? Preparing data The role of the identifier Other ... Read more

    Computer
    November 7, 2012 at 08:19 AM
  • Hardware Interrupts (IRQ) and Conflicts

    The Concept of Interrupts DMA Base Addresses Hardware Conflicts IRQ Configuration Resolving Hardware Conflicts The Concept of Interrupts Because the processor cannot simultaneously process several pieces of information (it processes one ... Read more

    Computer
    October 29, 2013 at 04:33 PM
  • File sharing in Windows XP

    Advantages File sharing involves making the content of one or more directories available through the network. All Windows systems have standard devices making it easy to share the content of a directory. However, file sharing may lead to ... Read more

    Network configuration
    April 4, 2011 at 05:07 PM
  • Substitution cipher

    Substitution cipher Substitution cipher involves replacing one or more entities (generally letters) in a message with one or more other entities. There are several types of substitution cryptosystems: Monoalphabetic substitution involves ... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Introduction to DOS

    The development of MS-DOS MS-DOS is the most well known operating system, the most commercialised version is that of Microsoft, christened "MS-DOS" (there are other versions such as DR-DOS). MS-DOS was created in 1981 when it was used on ... Read more

    MS Dos
    March 15, 2018 at 03:24 PM