Search
All categories
Results 81 - 105 of about 579
  • Risks related to wireless WiFi networks (802.11 or Wi-Fi)

    Lack of security Radio waves intrinsically have the power to propagate in all directions, with a relatively wide range. Because of this, it is very difficult to keep radio broadcasts confined to a limited area. Radio propagation also ... Read more

    Wifi
    October 16, 2008 at 09:43 AM
  • Installing a network adapter

    Purpose The purpose of this article is to set up a network to enable data exchanges between computers, resource sharing and network games. Is it therefore necessary to install a network card in each computer that may be part of the local ... Read more

    Network configuration
    October 16, 2008 at 09:43 AM
  • Messaging protocols (SMTP,POP3 and IMAP4)

    E-mail is considered as being the most widely used service on the Internet. So the TCP/IP protocol suite offers a range of protocols allowing the easy management of email routing over the network. The SMTP protocol The POP3 protocol The ... Read more

    Internet (protocols)
    April 16, 2018 at 11:47 AM
  • Agile Methods (RAD, XP)

    Agile methods "Agile methods" software development (also called Agile Modelling denoted AG for short) reduce software lifecycle time (thus speeding up development) by firstly developing a prototype version, then integrating functionality ... Read more

    Software engineering
    October 16, 2008 at 09:43 AM
  • Computer - History

    The history of the computer owes its existence to the fact that people, who are lazy by nature, have always sought to improve their ability to calculate, in order to reduce errors and save time. Origins: The abacus The "abacus" was ... Read more

    Computer history
    October 16, 2008 at 09:43 AM
  • Computer - ISA, MCA and VLB Buses

    Expansion Bus Expansion buses (sometimes called peripheral buses) are buses that have connectors that allow you to add expansion cards (peripherals) to a computer. There are different types of standard internal buses that are characterised ... Read more

    Computer
    October 16, 2008 at 09:43 AM
  • E-mail scams - Fund transfer scams

    Scams A "scam" is a fraudulent practice of African origin that involves extorting funds from internet users by enticing them with a sum of money and promising them a share of it. The use of scams originated in Nigeria, which has also given ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • FTP commands

    The FTP protocol FTP (File Transfer Protocol) is a protocol — meaning a standard language that lets two machines communicate — used so that computers of different types (or with different operating systems) can transfer files over a ... Read more

    Networking tools
    October 16, 2008 at 09:43 AM
  • Spreadsheets - Mathematical Functions

    Standard Functions Function Description ABS() This function returns the absolute value of a number. It therefore returns the number, if it is positive, or the opposite (positive) if it is negative ODD(value) Rounds a number up to the ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • Hard drive

    The role of the hard drive Structure How it works Block mode 32-bit mode Technical specifications The role of the hard drive The hard drive is the component which is used to permanently store data, as opposed to RAM, which is erased ... Read more

    Computer
    November 7, 2012 at 09:23 AM
  • zlclient - zlclient.exe

    zlclient - zlclient.exe zlclient.exe (zlclient stands for Zone Labs Client) is a process which corresponds to the firewall ZoneAlarm. It is an application which can safely be terminated. However, it is recommended that you not do so, in ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • Quality Organization

    Quality Organization Establishing a quality procedure is a comprehensive business project that requires the participation of all employees. Therefore, it is necessary to define a "quality organization" that fits into and hinges on the ... Read more

    Quality
    November 12, 2012 at 03:20 PM
  • Spreadsheets - Data Entry

    Cell Content A cell of a worksheet can contain a value or be empty. The value of a cell has two essential characteristics: a type, which means the intrinsic type of the data. There are generally three types of values: numeric values, for ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • Linux - The Vi editor

    Introduction to Vi Despite its very limited ergonomics, Vi i is one of the most popular text editors texte under Unix type systems (with Emacs and pico). Under Linux, there is a free version of Vi called Vim (Vi Improved). Vi (pronounced ... Read more

    Linux
    October 16, 2008 at 09:43 AM
  • Introduction to hacking

    Introduction to attacks Any computer connected to a computing network is potentially vulnerable to an attack. An "attack" is the exploitation of a flaw in a computing system (operating system, software program or user system) for purposes ... Read more

    Attacks
    March 5, 2018 at 03:41 AM
  • Network tests and diagnostics

    Testing the IP configuration Before doing anything else, you are advised to check the computer's IP configuration. Windows systems offer a command-line tool, called ipconfig, that lets you find out your computer's IP configuration. The ... Read more

    Network configuration
    October 16, 2008 at 09:43 AM
  • DB9 connector

    DB9 connector The DB9 (originally DE-9) connector is an analog 9-pin plug of the D-Subminiature connector family (D-Sub or Sub-D). The DB9 connector is mainly used for serial connections, allowing for the asynchronous transmission of data ... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • autorun - autorun.exe

    autorun - autorun.exe The process autorun.exe (autorun) is a generic Windows 98/NT/Me/2000/XP process which automatically runs a program from a CD-ROM when the CD is inserted in the disk drive. The process autorun is not in any way a virus ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • Spreadsheets - Worksheets

    The Concept of a Worksheet Spreadsheets display data and formulas in a table form (lines and columns) called a worksheet. A worksheet is made of lines (numbered with numbers) and of columns (numbered with letters). The intersection of a ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • Multichannel audio (5.1, 6.1, 7.1)

    Multichannel audio The term "multichannel audio" refers to the use of multiple audio tracks to reconstruct sound on a multi-speaker sound system. Two digits separated by a decimal point (2.1, 5.1, 6.1, 7.1, etc.) are used to classify the ... Read more

    Audio
    October 16, 2008 at 09:43 AM