Advert

How to Protect Your Computer on the Internet

Last edited by . Total of no comments in the discussion.

The Internet is an ever present threat to your computer. Even harmlessly browsing through sites may get your computer affected with a virus or spyware without you even knowing it. As many dangers as there may be out there, you can easily protect yourself by taking a few simple steps. Routers and Firewalls First of all, if you don’t already have a router, it is recommended that you go and get one, even if you only have one computer in your home. A Router acts as the best kind of Read More

Share on:

What is Sonic Update Manager?

Last edited by . Total of no comments in the discussion.

Sonic Update Manager is a secondary application that is included in the Sonic RecordNow software, a program that allows users to create CDs and DVDs. While Sonic RecordNow does not usually cause problems, Sonic Update Manager is often considered a nuisance because it continuously displays a message asking the user to insert the Sonic installation disc in order to update the software. In most cases, users do not have this disc and, therefore, cannot prevent this message from appearing.   How Sonic Update Manager Works The Sonic Update Manager uses Read More

Share on:

How to Flush DNS

Last edited by . Total of 43 comments in the discussion.

When surfing the Internet, a problem that can arise for consumers is getting a number of DNS errors or 404 errors in the web browser despite a working Internet connection. If this is the case, then learning how to flush DNS for your computer’s operating system (OS) is key to restoring the proper quality of service for your computer’s web browsing capability. The act of flushing the DNS removes the local resolution for the website name saved or cached on your computer which can result in a slower initial revisit Read More

Share on:

Meebo is Blocked – What Do I Do?

Last edited by . Total of 3 comments in the discussion.

When Meebo is blocked at your school or work place, you can use a variety of techniques to access the site. Perhaps one of the simplest methods is to use a proxy website. A proxy website is a web page which allows you to browse your favourite web sites even though your access to those web sites might be blocked by a content filter. You learn more about and find an updated and unblocked list of proxy websites here. Proxies, however, are highly susceptible to phishing attacks and significantly increase Read More

Share on:

Subnetting

Last edited by . Total of no comments in the discussion.

Subnetting is the process of breaking down an IP network into smaller sub-networks called “subnets.” Each subnet is a non-physical description (or ID) for a physical sub-network (usually a switched network of host containing a single router in a multi-router network). In many cases, subnets are created to serve as physical or geographical separations similar to those found between rooms, floors, buildings, or cities. There could be more than one definition for subnetting but perhaps the best explanation is that by default a network id has only one broadcast domain. Subnetting is Read More

Share on:

What is Electroluminescence?

Last edited by . Total of no comments in the discussion.

Electroluminescence is the phenomenon where a material emits light when electricity is passed through it. It is one of the greatest discoveries of the twentieth century and other forms of luminescence, including incandescence, chemiluminescence, cathodoluminescence, triboluminescence, and photoluminescence rival it. Electroluminescence generally involves a material producing light without producing heat. It is different from black body light emission, which only mechanical actions produce. How Electroluminescence Works Electroluminescence is produced when an electric current is passed through a semiconductor with tiny holes. As excited electrons pass over these holes, they are Read More

Share on:

Securing Exchange Server 2003

Last edited by . Total of no comments in the discussion.

Understanding Digital Signatures You can through digital signatures secure an Exchange Server 2003 messaging system. Digital signatures are used to verify the identities of the senders of data messages. With Exchange Server 2003, a digital signature can be attached to an e-mail message to ensure that the sender of the message is actually who he/she claims to be. If the content of the e-mail message is modified as the message is being transported, the signature becomes invalid. Hashing algorithms provide data authentication and non-repudiation. A hashing algorithm is a complex Read More

Share on:

Migrating from Proxy Server 2.0 to ISA Server

Last edited by . Total of no comments in the discussion.

Why Upgrade to ISA Server A few reasons for migrating from Proxy Server 2.0 to ISA Server are listed here: You need a H.323 Filter Gatekeeper. You need a multi-layered firewall. You need a firewall client. You need to perform SSL traffic inspection. You want to perform email-content screening. Stateful inspection has become important. You need secure publishing. You want to use smart application filters. You require advanced authentication. You want SecureNAT. You need to use system hardening templates. You want integrated Intrusion Detection. You want to use integrated VPNs Read More

Share on:

Mbps (Mega bits per second)

Last edited by . Total of no comments in the discussion.

Mbps stands for megabits per second. This is the data transfer speed explained in megabits, the unit. Therefore, if someone were to have a Mbps of 25, that means it can move 25 megabits per second. A bit is a unit of data described by either a 1 or a 0. This is simple binary. Eight of these individual bits, when combined together, is equal to a byte. Everything that is done on a computer, whether typing an a or hitting the exclamation mark requires a byte. For example: A Read More

Share on:

How to Reset a Dell BIOS Password

Last edited by . Total of 161 comments in the discussion.
Dell jumpers

Dell Dimension BIOS Password Recovery The BIOS password may be cleared from a Dell Dimension by moving the password jumper on the motherboard. The password jumper’s location on a Dell Dimension motherboard can be found by reviewing the Dimension User Guides. For most Dell Dimension desktops, the steps to reset a BIOS password and clear all CMOS settings are: Locate the 3-pin CMOS password reset jumper on the system board. Remove the jumper plug from pins 1 and 2. Place the jumper plug on pins 2 and 3 and wait Read More

Share on: