Search
All categories
Results 121 - 140 of about 579
  • E-mail bombing

    E-mail Bombing E-mail bombing involves sending several thousand identical messages to an electronic mailbox in order to overflow it. E-mails are stored on a messaging server until they are picked up by the owner of the messaging account. ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • TCP session hijacking

    TCP session hijacking "TCP session hijacking" is a technique that involves intercepting a TCP session initiated between two machines in order to hijack it. In that the authentication check is performed only when opening the session, a ... Read more

    Attacks
    October 16, 2008 at 09:43 AM
  • Introduction to power line communications (PLC)

    Introduction to PLC "Power Line Communications" basically means any technology that enables data transfer at narrow or broad band speeds through power lines by using advanced modulation technology. Depending on the country, the institution ... Read more

    Power Line Communications
    October 16, 2008 at 09:43 AM
  • History of the hard drive

    History of the hard drive The first hard drive was invented in early 1956, at the request of the US Air Force, by the company IBM. It was called the RAMAC 305 (with the name standing for Random Access Method of Accounting and Control), a ... Read more

    Computer history
    October 16, 2008 at 09:43 AM
  • The ARP protocol

    The aim of ARP protocol The ARP protocol plays a key role among Internet layer protocols relating to TCP/IP, since it enables the physical address of a network interface card corresponding to an IP address to be known. That is why it is ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • IP Address

    What is an IP address? Computers communicate over the Internet using the IP protocol (Internet Protocol), which uses numerical addresses, called IP addresses, made up of four whole numbers (4 bytes) between 0 and 255 and written in the ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • Programming languages - Instructions

    What does an instruction look like? The instruction is the key element in the computer as it tells the processor which action should be performed. The instructions which are to be executed are indicated in the source file and the computer ... Read more

    Programming
    October 16, 2008 at 09:43 AM
  • Hardware Interrupts (IRQ) and Conflicts

    The Concept of Interrupts DMA Base Addresses Hardware Conflicts IRQ Configuration Resolving Hardware Conflicts The Concept of Interrupts Because the processor cannot simultaneously process several pieces of information (it processes one ... Read more

    Computer
    October 29, 2013 at 04:33 PM
  • Data transmission - Introduction

    Data representation The purpose of a network is to transmit information from one computer to another. To do this, you first have to decide how to encode the data to be sent, in other words its computer representation. This will differ ... Read more

    Data transmission
    October 16, 2008 at 09:43 AM
  • The DivX format (DivX, Xvid, 3ivX, VP3)

    DivX format The DivX is a video compression/decompression format which allows videos to be compressed to very small volumes with a quite reasonable loss of quality. Thus, the DivX format makes it possible to store a complete film on a 650 ... Read more

    Video
    October 16, 2008 at 09:43 AM
  • CCM - Who We Are

    Welcome to CCM! We are France's number one tech website (CommentCaMarche.net). Every day, millions of users ... Read more

    About Us
    August 6, 2019 at 06:49 AM
  • Peer-to-peer networking

    Introduction to peer-to-peer architecture In contrast to client-server networks there is no dedicated server in peer-to-peer architecture . Thus each computer in such a network is part server and part client. This means that each computer ... Read more

    Client/Server
    November 12, 2012 at 12:43 PM
  • Types of connectors

    5-pin DIN plugs A DIN (or DIN5) connector is a plug with 5 pins, formerly used to connect keyboards to computers: ... Read more

    Cables and connectors
    October 16, 2008 at 09:43 AM
  • Enterprise Application Integration (EAI)

    Introduction to the EAI concept The purpose of EAI (Enterprise Application Integration) is the interoperability and organization of the flow of information between heterogeneous applications, i.e. ensure communcation between the different ... Read more

    e-Business
    October 16, 2008 at 09:43 AM
  • QoS - Quality of service

    The notion of quality of service The term QoS (an acronym of "Quality of Service") refers to the ability to provide a service (in particular a communication media consistent with requirements in terms of response time and band width). ... Read more

    Internet (protocols)
    October 16, 2008 at 09:43 AM
  • Proxy and reverse proxy servers

    Proxy servers A proxy server is a machine which acts as an intermediary between the computers of a local area network (sometimes using protocols other than TCP/IP) and the Internet Most of the time the proxy server is used for the web, and ... Read more

    Local Area Network
    October 16, 2008 at 09:43 AM
  • FTP commands

    The FTP protocol FTP (File Transfer Protocol) is a protocol — meaning a standard language that lets two machines communicate — used so that computers of different types (or with different operating systems) can transfer files over a ... Read more

    Networking tools
    October 16, 2008 at 09:43 AM
  • FAT16 and FAT32

    The FAT16 file system The first file system to be used on a Microsoft operating system was the FAT system, which uses a file allocation table. The file allocation table is actually an index which lists the content of the disk in order to ... Read more

    Computer: maintenance
    October 16, 2008 at 09:43 AM
  • Spreadsheets - Data Entry

    Cell Content A cell of a worksheet can contain a value or be empty. The value of a cell has two essential characteristics: a type, which means the intrinsic type of the data. There are generally three types of values: numeric values, for ... Read more

    Spreadsheet
    October 16, 2008 at 09:43 AM
  • The Windows User Interface

    The Taskbar The Windows 9x user interface (9x refers to Windows 95 and Windows 98 together) is characterised by a bar at the bottom of your screen (it may be moved to another edge by left-mouse-clicking on it and dragging it to the desired ... Read more

    Windows
    October 16, 2008 at 09:43 AM