What is the BIOS? Why optimize your BIOS? What does the BIOS setup look like? The Video ROM BIOS shadow function Disable unneeded options BIOS parameters related to memory Burst access Wait states Refresh What is the BIOS? The BIOS (Basic ... Read more
E-mail Bombing E-mail bombing involves sending several thousand identical messages to an electronic mailbox in order to overflow it. E-mails are stored on a messaging server until they are picked up by the owner of the messaging account. ... Read more
Multichannel audio The term "multichannel audio" refers to the use of multiple audio tracks to reconstruct sound on a multi-speaker sound system. Two digits separated by a decimal point (2.1, 5.1, 6.1, 7.1, etc.) are used to classify the ... Read more
Information security officer (ISO) An ISO (information security officer) is in charge of setting and a company's security policy. He/she also plays a critical role in informing, advising, and alerting the general management on matters ... Read more
The role of the hard drive Structure How it works Block mode 32-bit mode Technical specifications The role of the hard drive The hard drive is the component which is used to permanently store data, as opposed to RAM, which is erased ... Read more
Printers Characteristics Daisy Wheel Printer Dot-Matrix Printer Inkjet Printer and Bubble Jet Printer Laser Printer LED Printer Printer Command Language Print Servers Printers The printer is a peripheral that allows you to make a print-out ... Read more
The Scanner A scanner is an acquisition peripheral for scanning documents, i.e. converting a paper document to a digital image. There are generally three types of scanner: Flat scanners let you scan a document by placing it flat against a ... Read more
Introduction to the Sasser virus Appearing in May 2004, the Sasser virus (also known as the W32/Sasser.worm, W32.Sasser.Worm, Worm.Win32.Sasser.a, Worm.Win32.Sasser.b or Win32.Sasser) is a virus which exploits a security hole in the LSASS ... Read more
Communitic International is responsible for the collection and the processing of personal data. Communitic International is a subsidiary of CCM Benchmark Group. Communitic International is a registered SARL with a capital of 10 000 €, ... Read more
The Internet makes it possible to carry out a wide variety of remote operations, and particularly server administration and file transfers. The Telnet protocol and the BSD r-commands (rsh, rlogin and rexec) that let users perform these ... Read more
Why connect a computer to a sound system? These days, computers provide sound quality that is as good as hifi sound systems. It is possible to use them to listen to music, in particular thanks to mp3 files that provide sound quality that ... Read more
Introduction to the GPRS standard The GPRS (General Packet Radio Service) standard is an evolution of the GSM standard, and for that reason is sometimes called GSM++ (or GMS 2+). As it is a second-generation telephony standard that allows ... Read more
LAND attack The "LAND attack" is a network attack dating from 1997 using IP address spoofing to exploit a flaw on some TCP/IP protocol implementations in systems. The name of this attack comes from the name given to the first distributed ... Read more
Most web application attacks involving soliciting a website with manually entered data to generate an unexpected context. Web application parameters The HTTP protocol, a communication protocol on the web, makes it possible to convey ... Read more
The various database models Databases appeared in the late 1960s, at a time when the need for a flexible information management system had arisen. There are five models of DBMS, which are distinguished based on how they represent the data ... Read more
The FTP protocol FTP (File Transfer Protocol) is a protocol — meaning a standard language that lets two machines communicate — used so that computers of different types (or with different operating systems) can transfer files over a ... Read more
Interest of a firewall When a computer is connected to the Internet (or to any network), it is a potential target for attacks. Numerous data packets are sent at random by hackers in order to locate machines connected to the network. They ... Read more
All Rights Reserved - 2018 © Communitic International Object Legal Disclaimers and Imprint Definitions ... Read more
CCM's Creative Commons License Deed 3.0 Attribution — NonCommercial — ShareAlike 3.0 You are free ... Read more
Port scanning A "vulnerability scanner" (sometimes called a "network analyzer") is a utility program that makes it possible to perform a security audit on a network by scanning for open ports on a given machine or an entire network. The ... Read more