Search
All categories
Results 121 - 140 of about 579
  • Linking two PCs with a null modem cable

    Linking two computers without network cards The best way to link two computers is to use an RJ45 cable to connect the machines' network cards. However, when one or both of the computers has no network card, there is still a fairly easy way ... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • Information security officer (ISO)

    Information security officer (ISO) An ISO (information security officer) is in charge of setting and a company's security policy. He/she also plays a critical role in informing, advising, and alerting the general management on matters ... Read more

    IT professions
    October 16, 2008 at 09:43 AM
  • inetinfo - inetinfo.exe

    inetinfo - inetinfo.exe inetinfo.exe (inetinfo stands for Internet Information Service) is a Windows NT/2000/XP generic process which corresponds to the web server IIS (Microsoft Information Server). The process inetinfo is not in any way ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • Formatting - Formatting a hard drive

    Before trying to understand formatting, you first need to understand how a hard drive works. Many people do not distinguish low-level formatting (also called physical formatting) from high-level formatting (also called logical formatting). ... Read more

    Computer: maintenance
    October 16, 2008 at 09:43 AM
  • The YUV (YCrCb) format

    The YUV standard The YUV standard (also called CCIR 601), known before as YCrCb (Y Cr Cb), is a color representation model dedicated to analogue video. It is based on a video transmission mode with separate components using three different ... Read more

    Video
    May 11, 2011 at 05:01 PM
  • Sharing and permissions in Windows NT

    Introduction to folder sharing Sharing allows resources to be designated as being available to all users over a network. When a folder is shared, users can log into the folder from across the network and access the files within, as though ... Read more

    Windows NT (XP,Vista,...)
    October 16, 2008 at 09:43 AM
  • Smileys (emoticons)

    Why smileys? When typing words on the Internet, it's not always easy to convey feelings, emotions, or concepts like humor to the people you're communicating with. Here's a simple tip for getting the right message across: Use ASCII ... Read more

    World Wide Web
    October 16, 2008 at 09:43 AM
  • The Printer

    Printers Characteristics Daisy Wheel Printer Dot-Matrix Printer Inkjet Printer and Bubble Jet Printer Laser Printer LED Printer Printer Command Language Print Servers Printers The printer is a peripheral that allows you to make a print-out ... Read more

    Computer
    November 7, 2012 at 08:26 AM
  • control - control.exe

    control - control.exe control.exe (control stands for Control Panel) is a Windows NT/2000/XP generic process which corresponds to the control panel. The file that corresponds to this process is normally found in the directory "%SystemRoot ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • ctfmon - ctfmon.exe

    ctfmon - ctfmon.exe ctfmon.exe (whose full name is Alternative User Input Services) is a Windows NT/2000/XP generic process used for managing alternative methods of text input, such as speech recognition software, handwriting recognition ... Read more

    Windows processes
    October 16, 2008 at 09:43 AM
  • Environment variables

    Environment variables An environment variable is a dynamic value loaded into the memory that can be used by several processes operating simultaneously. On most operating systems, the location of some libraries or of the main system ... Read more

    Operating System
    October 16, 2008 at 09:43 AM
  • The Sasser worm

    Introduction to the Sasser virus Appearing in May 2004, the Sasser virus (also known as the W32/Sasser.worm, W32.Sasser.Worm, Worm.Win32.Sasser.a, Worm.Win32.Sasser.b or Win32.Sasser) is a virus which exploits a security hole in the LSASS ... Read more

    Viruses and threats
    October 16, 2008 at 09:43 AM
  • Telnet protocol

    Introduction to the Telnet protocol The Telnet protocol is a standard internet protocol enabling terminals and applications to interface over the Internet. This protocol provides the basic rules making it possible to link a client (system ... Read more

    Internet (protocols)
    October 29, 2012 at 03:45 PM
  • Random access memory (RAM or PC memory)

    Types of random access memory Operation of the random access memory RAM module formats DRAM PM DRAM FPM DRAM EDO SDRAM DR-SDRAM (Rambus DRAM) DDR-SDRAM DDR2-SDRAM summary table Synchronization (timings) Error correction Parity bit ECC ... Read more

    Computer
    November 12, 2012 at 03:33 PM
  • Intrusion Test

    Intrusion Test Intrusion tests (abbreviated as pen tests) consist in testing an information system's protection methods by subjecting the system to a real situation. Two methods are generally used: The black box method that consists of ... Read more

    Security
    October 16, 2008 at 09:43 AM
  • The Nimda virus

    Introduction to the Nimda virus Le Nimda virus (code name W32/Nimda) is a worm which spreads by email. It also has four other ways to spread: The web Shared folders Microsoft IIS security holes File transfer At particular risk are users of ... Read more

    Viruses and threats
    October 16, 2008 at 09:43 AM
  • DBMS models

    The various database models Databases appeared in the late 1960s, at a time when the need for a flexible information management system had arisen. There are five models of DBMS, which are distinguished based on how they represent the data ... Read more

    Databases
    October 16, 2008 at 09:43 AM
  • Operating Systems - DOS - Memory

    Introduction to memory Memory is an area where programs are stored and from where they can be executed. A PC compatible computer has three types of memory: conventional extended paged The amount of memory present (and available) in a ... Read more

    MS Dos
    November 12, 2012 at 03:34 PM
  • Employee Relationship Management (ERM)

    The term "Employee Relationship Management" (acronym ERM), translate as "management of the relationship with the employees" refers to the use of technologies in the management of human resources. This concept is based on client ... Read more

    e-Business
    October 16, 2008 at 09:43 AM
  • Proxy and reverse proxy servers

    Proxy servers A proxy server is a machine which acts as an intermediary between the computers of a local area network (sometimes using protocols other than TCP/IP) and the Internet Most of the time the proxy server is used for the web, and ... Read more

    Local Area Network
    October 16, 2008 at 09:43 AM