An email has three basic parts. The first is the header, a set of lines containing ... Read more
There are several kinds of hardware that may be used to implement a WiFi wireless network, including wireless adapters and access points. Wireless adapters, or network interface controllers (NICs for short), are network cards with the 802. ... Read more
As simple as it is to use, email relies on a more complicated set of operating procedures ... Read more
Introduction to denial-of-service attacks A "denial-of-service attack" (abbreviated DoS) is a type of attack that aims to make an organization's services or resources unavailable for an indefinite amount of time. Most of the time, these ... Read more
Partitioning is the process of writing the hard drive sectors that will make up the partition table. It contains information on the partition, including sector size, position with respect to the primary partition, types of partitions ... Read more
Different types of private networks are distinguished based on their sizes (in terms of the number of machines), their data transfer speeds, and their reach. Private networks are networks that belong to a single organization. There are ... Read more
Introduction to Formulas The main use of a spreadsheet is to automate calculations, which means using cells to perform operations based on values in other cells. The spreadsheet recalculates all the values each time a change is made to the ... Read more
Introduction to digital transmission Digital transmission is the sending of information over a physical communications media in the form of digital signals. Analogue signals must therefore be digitised first before being transmitted. ... Read more
In computing, a bus is defined as a set of physical connections (i.e. cables, printed circuits, etc.), which can be shared by multiple hardware components in order to communicate with one another. The purpose of buses is to reduce the ... Read more
The URL (Uniform Resource Locator) of a web application is the vector that makes it possible to indicate the requested resource. This article will show you how to protect yourself against URL manipulation attacks. ... Read more
The majority of people in the world, not having lines (cable or Ethernet) linked directly to the Internet, must use telephone lines, the most widely used network, to connect to the Internet. The connection is made using a modem, a device ... Read more
The term Electronic commerce (or e-Commerce) refers to the use of an electronic medium to ... Read more
The generic term network refers to a group of entities (i.e. objects, people, etc.) that are connected to one another. A network, therefore, allows material or immaterial elements to be circulated among all of these entities, based on well- ... Read more
In client/server systems, there are several types of configurations. This article will get into 2-tier architecture and 3-tier architecture and explain the differences and the similarities of the two systems. ... Read more
What is email? Electronic mail (also known as email or e-mail) is one of the most commonly used services on the Internet, allowing people to send messages to one or more recipients. Email was invented by Ray Tomlinson in 1972. Why use ... Read more
How Bluetooth works Communication principle Establishing connections Bluetooth profiles How Bluetooth works The Bluetooth standard, like WiFi, uses the FHSS technique (Frequency-Hopping Spread Spectrum), which involves splitting the ... Read more
On May 15, 1973, the NBS (National Bureau of Standards, now called NIST (National Institute of Standards and Technology) published a request in the Federal Register for an encryption algorithm that would meet the following criteria: have a ... Read more
A given transmission on a communications channel between two machines can occur in several different ways. The transmission is characterized by: tthe direction of the exchanges; the transmission mode, or the number of bits sent ... Read more
Windows Command Prompt or cmd.exe is a Windows NT/2000/XP generic process that opens a text- ... Read more
Every computer is built with tons of different ports that perform various functions. Two of ... Read more