E-mail Bombing E-mail bombing involves sending several thousand identical messages to an electronic mailbox in order to overflow it. E-mails are stored on a messaging server until they are picked up by the owner of the messaging account. ... Read more
TCP session hijacking "TCP session hijacking" is a technique that involves intercepting a TCP session initiated between two machines in order to hijack it. In that the authentication check is performed only when opening the session, a ... Read more
Introduction to PLC "Power Line Communications" basically means any technology that enables data transfer at narrow or broad band speeds through power lines by using advanced modulation technology. Depending on the country, the institution ... Read more
History of the hard drive The first hard drive was invented in early 1956, at the request of the US Air Force, by the company IBM. It was called the RAMAC 305 (with the name standing for Random Access Method of Accounting and Control), a ... Read more
The aim of ARP protocol The ARP protocol plays a key role among Internet layer protocols relating to TCP/IP, since it enables the physical address of a network interface card corresponding to an IP address to be known. That is why it is ... Read more
What is an IP address? Computers communicate over the Internet using the IP protocol (Internet Protocol), which uses numerical addresses, called IP addresses, made up of four whole numbers (4 bytes) between 0 and 255 and written in the ... Read more
What does an instruction look like? The instruction is the key element in the computer as it tells the processor which action should be performed. The instructions which are to be executed are indicated in the source file and the computer ... Read more
The Concept of Interrupts DMA Base Addresses Hardware Conflicts IRQ Configuration Resolving Hardware Conflicts The Concept of Interrupts Because the processor cannot simultaneously process several pieces of information (it processes one ... Read more
Data representation The purpose of a network is to transmit information from one computer to another. To do this, you first have to decide how to encode the data to be sent, in other words its computer representation. This will differ ... Read more
DivX format The DivX is a video compression/decompression format which allows videos to be compressed to very small volumes with a quite reasonable loss of quality. Thus, the DivX format makes it possible to store a complete film on a 650 ... Read more
Welcome to CCM! We are France's number one tech website (CommentCaMarche.net). Every day, millions of users ... Read more
Introduction to peer-to-peer architecture In contrast to client-server networks there is no dedicated server in peer-to-peer architecture . Thus each computer in such a network is part server and part client. This means that each computer ... Read more
5-pin DIN plugs A DIN (or DIN5) connector is a plug with 5 pins, formerly used to connect keyboards to computers: ... Read more
Introduction to the EAI concept The purpose of EAI (Enterprise Application Integration) is the interoperability and organization of the flow of information between heterogeneous applications, i.e. ensure communcation between the different ... Read more
The notion of quality of service The term QoS (an acronym of "Quality of Service") refers to the ability to provide a service (in particular a communication media consistent with requirements in terms of response time and band width). ... Read more
Proxy servers A proxy server is a machine which acts as an intermediary between the computers of a local area network (sometimes using protocols other than TCP/IP) and the Internet Most of the time the proxy server is used for the web, and ... Read more
The FTP protocol FTP (File Transfer Protocol) is a protocol — meaning a standard language that lets two machines communicate — used so that computers of different types (or with different operating systems) can transfer files over a ... Read more
The FAT16 file system The first file system to be used on a Microsoft operating system was the FAT system, which uses a file allocation table. The file allocation table is actually an index which lists the content of the disk in order to ... Read more
Cell Content A cell of a worksheet can contain a value or be empty. The value of a cell has two essential characteristics: a type, which means the intrinsic type of the data. There are generally three types of values: numeric values, for ... Read more
The Taskbar The Windows 9x user interface (9x refers to Windows 95 and Windows 98 together) is characterised by a bar at the bottom of your screen (it may be moved to another edge by left-mouse-clicking on it and dragging it to the desired ... Read more