Search
All categories
Results 121 - 140 of about 579
  • BIOS optimization

    What is the BIOS? Why optimize your BIOS? What does the BIOS setup look like? The Video ROM BIOS shadow function Disable unneeded options BIOS parameters related to memory Burst access Wait states Refresh What is the BIOS? The BIOS (Basic ... Read more

    Computer: maintenance
    November 12, 2012 at 03:20 PM
  • E-mail bombing

    E-mail Bombing E-mail bombing involves sending several thousand identical messages to an electronic mailbox in order to overflow it. E-mails are stored on a messaging server until they are picked up by the owner of the messaging account. ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Multichannel audio (5.1, 6.1, 7.1)

    Multichannel audio The term "multichannel audio" refers to the use of multiple audio tracks to reconstruct sound on a multi-speaker sound system. Two digits separated by a decimal point (2.1, 5.1, 6.1, 7.1, etc.) are used to classify the ... Read more

    Audio
    October 16, 2008 at 09:43 AM
  • Information security officer (ISO)

    Information security officer (ISO) An ISO (information security officer) is in charge of setting and a company's security policy. He/she also plays a critical role in informing, advising, and alerting the general management on matters ... Read more

    IT professions
    October 16, 2008 at 09:43 AM
  • Hard drive

    The role of the hard drive Structure How it works Block mode 32-bit mode Technical specifications The role of the hard drive The hard drive is the component which is used to permanently store data, as opposed to RAM, which is erased ... Read more

    Computer
    November 7, 2012 at 09:23 AM
  • The Printer

    Printers Characteristics Daisy Wheel Printer Dot-Matrix Printer Inkjet Printer and Bubble Jet Printer Laser Printer LED Printer Printer Command Language Print Servers Printers The printer is a peripheral that allows you to make a print-out ... Read more

    Computer
    November 7, 2012 at 08:26 AM
  • The Scanner

    The Scanner A scanner is an acquisition peripheral for scanning documents, i.e. converting a paper document to a digital image. There are generally three types of scanner: Flat scanners let you scan a document by placing it flat against a ... Read more

    Computer
    October 16, 2008 at 09:43 AM
  • The Sasser worm

    Introduction to the Sasser virus Appearing in May 2004, the Sasser virus (also known as the W32/Sasser.worm, W32.Sasser.Worm, Worm.Win32.Sasser.a, Worm.Win32.Sasser.b or Win32.Sasser) is a virus which exploits a security hole in the LSASS ... Read more

    Viruses and threats
    October 16, 2008 at 09:43 AM
  • Processing of Personal Data - CCM

    Communitic International is responsible for the collection and the processing of personal data. Communitic International is a subsidiary of CCM Benchmark Group. Communitic International is a registered SARL with a capital of 10 000 €, ... Read more

    Terms of Use
    July 4, 2018 at 05:41 AM
  • Cryptography - Secure Shell (SSH protocol)

    The Internet makes it possible to carry out a wide variety of remote operations, and particularly server administration and file transfers. The Telnet protocol and the BSD r-commands (rsh, rlogin and rexec) that let users perform these ... Read more

    Cryptography
    October 16, 2008 at 09:43 AM
  • Connecting the computer to a HIFI sound system

    Why connect a computer to a sound system? These days, computers provide sound quality that is as good as hifi sound systems. It is possible to use them to listen to music, in particular thanks to mp3 files that provide sound quality that ... Read more

    Practical notes
    October 16, 2008 at 09:43 AM
  • The GPRS standard

    Introduction to the GPRS standard The GPRS (General Packet Radio Service) standard is an evolution of the GSM standard, and for that reason is sometimes called GSM++ (or GMS 2+). As it is a second-generation telephony standard that allows ... Read more

    Mobile phones
    October 16, 2008 at 09:43 AM
  • LAND attack

    LAND attack The "LAND attack" is a network attack dating from 1997 using IP address spoofing to exploit a flaw on some TCP/IP protocol implementations in systems. The name of this attack comes from the name given to the first distributed ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Data tampering attacks

    Most web application attacks involving soliciting a website with manually entered data to generate an unexpected context. Web application parameters The HTTP protocol, a communication protocol on the web, makes it possible to convey ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • DBMS models

    The various database models Databases appeared in the late 1960s, at a time when the need for a flexible information management system had arisen. There are five models of DBMS, which are distinguished based on how they represent the data ... Read more

    Databases
    October 16, 2008 at 09:43 AM
  • FTP commands

    The FTP protocol FTP (File Transfer Protocol) is a protocol — meaning a standard language that lets two machines communicate — used so that computers of different types (or with different operating systems) can transfer files over a ... Read more

    Networking tools
    October 16, 2008 at 09:43 AM
  • Installing the Tiny Personal Firewall

    Interest of a firewall When a computer is connected to the Internet (or to any network), it is a potential target for attacks. Numerous data packets are sent at random by hackers in order to locate machines connected to the network. They ... Read more

    Practical notes
    September 11, 2012 at 09:27 AM
  • General Terms and Conditions of Use

    All Rights Reserved - 2018 © Communitic International Object Legal Disclaimers and Imprint Definitions ... Read more

    Terms of Use
    June 8, 2018 at 08:25 AM
  • Copyright Information

    CCM's Creative Commons License Deed 3.0 Attribution — NonCommercial — ShareAlike 3.0 You are free ... Read more

    Terms of Use
    June 12, 2018 at 05:59 AM
  • Vulnerability scanners - Port scanning

    Port scanning A "vulnerability scanner" (sometimes called a "network analyzer") is a utility program that makes it possible to perform a security audit on a network by scanning for open ports on a given machine or an entire network. The ... Read more

    Attacks
    October 16, 2008 at 09:43 AM