All categories
Results 121 - 140 of about 579
  • PS/2 connector

    PS/2 connector The PS/2 connector (mini-DIN6 format) is mainly used to connect computers to keyboards and mice. Pins Pin number Function 1 DATA 2 Not Connected 3 Ground 4 Power, +5VDC 5 Clock 6 Not connected... Read more

    Cables and connectors
    November 10, 2010 at 08:57 AM
  • TCP protocol

    The characteristics of TCP protocol TCP (which means Transmission Control Protocol) is one of the main protocols of the transport layer of the TCP/IP model. It makes it possible, at application level, to manage data coming from (or... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • Telnet protocol

    Introduction to the Telnet protocol The Telnet protocol is a standard internet protocol enabling terminals and applications to interface over the Internet. This protocol provides the basic rules making it possible to link a client... Read more

    Internet (protocols)
    October 29, 2012 at 03:45 PM
  • Proxy and reverse proxy servers

    Proxy servers A proxy server is a machine which acts as an intermediary between the computers of a local area network (sometimes using protocols other than TCP/IP) and the Internet Most of the time the proxy server is used for the web,... Read more

    Local Area Network
    October 16, 2008 at 09:43 AM
  • ATA, IDE and EIDE

    Overview The ATA (Advanced Technology Attachment) standard is a standard interface that allows you to connect storage peripherals to PC computers. The ATA standard was developed on May 12, 1994 by the ANSI (document X3.221-1994).... Read more

    April 24, 2009 at 06:55 AM
  • Hardware Interrupts (IRQ) and Conflicts

    The Concept of Interrupts DMA Base Addresses Hardware Conflicts IRQ Configuration Resolving Hardware Conflicts The Concept of Interrupts Because the processor cannot simultaneously process several pieces of information (it processes one... Read more

    October 29, 2013 at 04:33 PM
  • Creating a LAN

    Why set up a LAN? If you have several computers, it may be worthwhile to connect them in order to create a local area network (LAN). Setting up such a network is much less expensive than what you might think. Here are a few ways you... Read more

    Practical notes
    October 16, 2008 at 09:43 AM
  • Formatting - Formatting a hard drive

    Before trying to understand formatting, you first need to understand how a hard drive works. Many people do not distinguish low-level formatting (also called physical formatting) from high-level formatting (also called logical... Read more

    Computer: maintenance
    October 16, 2008 at 09:43 AM
  • Clusters

    The Concept of Clusters A "cluster" is an architecture made up of several computers that form nodes, where each node is able to operate independently. There are two main types of clusters: High-availability clusters spread a workload... Read more

    High availability
    October 16, 2008 at 09:43 AM
  • Data transmission - Multiplexing

    Introduction to multiplexing Multiplexing refers to the ability to transmit data coming from several pairs of equipment (transmitters and receivers) called low-speed channels on a single physical medium (called the high-speed channel). ... Read more

    Data transmission
    October 16, 2008 at 09:43 AM
  • MKV format (Matroska Video)

    MKV format The MKV format (Matroska Video) is an entirely free video format. More precisely, it is a container (hence the name Matroska, in reference to the Russian dolls contained within another) making it possible to contain video... Read more

    October 16, 2008 at 09:43 AM
  • The Sasser worm

    Introduction to the Sasser virus Appearing in May 2004, the Sasser virus (also known as the W32/Sasser.worm, W32.Sasser.Worm, Worm.Win32.Sasser.a, Worm.Win32.Sasser.b or Win32.Sasser) is a virus which exploits a security hole in the... Read more

    Viruses and threats
    October 16, 2008 at 09:43 AM
  • Data tampering attacks

    Most web application attacks involving soliciting a website with manually entered data to generate an unexpected context. Web application parameters The HTTP protocol, a communication protocol on the web, makes it possible to convey... Read more

    October 16, 2008 at 09:43 AM
  • Rules for proper email use

    Netiquette Netiquette (a contraction of the words "Net" and "etiquette") refers to the set of rules governing correct behavior on the Internet, in order to respect others and be respected in turn. They serve as guidelines for civility... Read more

    October 16, 2008 at 09:43 AM
  • PGP - Pretty Good Privacy

    Introduction to PGP PGP (Pretty Good Privacy) is a cryptosystem (encryption system) that was invented by Philip Zimmermann, a computer analyst. From 1984 to 1991, Philip Zimmermann worked on a program that made it possible to run RSA on... Read more

    October 16, 2008 at 09:43 AM
  • Cryptography - Secure Shell (SSH protocol)

    The Internet makes it possible to carry out a wide variety of remote operations, and particularly server administration and file transfers. The Telnet protocol and the BSD r-commands (rsh, rlogin and rexec) that let users perform these... Read more

    October 16, 2008 at 09:43 AM
  • Cryptography - Secure Sockets Layers (SSL)

    Introduction to SSL SSL (Secure Sockets Layers) is a process that manages the security of transactions made on the Internet. The SSL standard was developed by Netscape, together with Mastercard, Bank of America, MCI and Silicon... Read more

    October 16, 2008 at 09:43 AM
  • Networking - Thick client

    Thick client The term "thick client" as opposed to thin client describes a graphical client application which runs on the user's operating system. A thick client usually has greater processing capacity and may have a sophisticated... Read more

    October 16, 2008 at 09:43 AM
  • Peer-to-peer networking

    Introduction to peer-to-peer architecture In contrast to client-server networks there is no dedicated server in peer-to-peer architecture . Thus each computer in such a network is part server and part client. This means that each... Read more

    November 12, 2012 at 12:43 PM
  • Positioning elements in CSS

    Using style sheets along with the and tags, you can specify the location of text or images down to the pixel. This is possible with versions 4 and higher of Netscape and Internet Explorer; however, the technique is still problematic and... Read more

    October 16, 2008 at 09:43 AM