Advert

How to Erase Browser History

Last edited by . Total of no comments in the discussion.

Erasing browser history clears the record of what web sites the user visited over a period of time. This can help to protect privacy by preventing others from monitoring what web sites the user has been visiting. Erasing Internet Explorer’s Browser History By default, Internet Explorer keeps browser history for 20 days. To erase browser history in Internet Explorer, follow these steps: Open the Tools menu from the toolbar. Select Internet Options from the Tools Menu. Click the Clear History button. Click the Yes button on confirmation.   Erasing Firefox’s Read More

Share on:

NetBIOS Node Types

Last edited by . Total of no comments in the discussion.

A NetBIOS node type is a method that a computer uses to resolve a NetBIOS name into an IP address. A NetBIOS node type allows an administrator to configure the order and method that a client uses when resolving NetBIOS names to IP addresses. Understanding how the various node types function will help users to properly configure their WINS solution. Windows Server supports the following node types: B-node (broadcast): it uses broadcasts for name resolution and registration. In a large network, a broadcast increases the network’s load. In addition, routers Read More

Share on:

Understanding NetBIOS Name Resolution

Last edited by . Total of no comments in the discussion.

NetBIOS, broadcasts names to listening nodes on the network. NetBIOS utilizes a User Datagram Protocol (UDP) query to broadcast names. NetBIOS names identified computers on the network before the introduction of Windows 2000. The NetBIOS name is resolved to an IP address through Windows Internet Name Service (WINS), broadcasting, or the LMHOSTS file. If the LAN is a NetBIOS LAN, the NetBIOS name is then the network address. The NetBIOS name is assigned by an administrator when the operating system is installed. To enable communication, the following requirements exist: NetBIOS Read More

Share on:

How to Change to Directories with Strange Characters in them

Last edited by . Total of no comments in the discussion.

On Unix systems, people will sometimes create directories with strange characters in the names. These characters can make it more difficult to access the directories, providing a small amount of “security through obscurity.” This technique is used to try to hide information, most often warez (commercial software) or hacking tools. There are several things you can do to determine what these strange characters are. One is to use the arguments to the `ls` command that cause `ls` to give you more information:     From the man page for `ls`: -F Causes Read More

Share on:

Java Source Code

Last edited by . Total of 1 comment in the discussion.

Java source code is code that you write in the Java programming language. Java source code is converted to Java bytecode by the Java compiler. Java source code files usually have the .java extension. Sun recommends that Java source code files be no longer than two thousand lines. Larger source code files should be split up into multiple smaller files.

Share on:

Mobile Satellite Service

Last edited by . Total of no comments in the discussion.

Mobile Satellite Service (MSS) is a type of mobile telephone service that depends on portable terrestrial satellites rather than fixed terrestrial satellites that are also known as cell phone towers. Portable terrestrial satellites are similar to cell phone towers, but can be mounted on moving vehicles such as cars, ships, and airplanes, and individual users can even carry them. Mobile Satellite Service is not as common as GSM (Global System for Mobile Communications), but is frequently used for its global reception.   How Mobile Satellite Service Works Mobile Satellite Service Read More

Share on:

How to Unzip Files

Last edited by . Total of no comments in the discussion.

ZIP is a standard file format used for compression and archival of data files. When a file is “zipped” it will normally save a significant amount of file storage space if the files that are zipped are based on text data. Pictures and other multimedia files will not normally compress significantly when zipped if they are a format that already incorporates compression technology such as JPEG ,GIF, and BMPs (bitmaps). Advantages of zipping files include saving storage space on the local hard drive, creating the ability to send smaller attachments Read More

Share on:

Antimatter

Last edited by . Total of no comments in the discussion.

As matter is composed of many particles such as electrons and protons, antimatter is composed of antielectrons (also called positrons) and antiprotons. The antimatter concept also tells us that all matter has corresponding and equivalent antimatter that possess opposite properties. For instance the hydrogen atom will have corresponding antimatter called antihydrogen and all of the antihydrogen's particles will have properties opposite those of the normal hydrogen particles. A hydrogen atom's proton has a positive charge while the antiproton of the antihydrogen will have a negative charge. However, the antihydrogen's antiproton Read More

Share on:

RSN (Robust Secure Network)

Last edited by . Total of 1 comment in the discussion.

RSN (Robust Secure Network) is a protocol for establishing secure communications over an 802.11 wireless network. RSN (Robust Secure Network) is part of the 802.11i standard. The RSN Protocol Process The RSN protocol functions as follows: The wireless NIC sends a Probe Request. The wireless access point sends a Probe Response with an RSN Information Exchange (IE) frame. The wireless NIC requests authentication via one of the approved methods. The wireless access point provides authentication for the wireless NIC. The wireless NIC sends an Association Request with an RSN Information Read More

Share on:

How a Wireless Mouse Works

Last edited by . Total of 20 comments in the discussion.

The mouse is an extremely popular device. While the majority of mice are connected directly to the computers peripheral input via a cord and the computer’s main power powers it, wireless mice are becoming extremely popular as they give computer users cordless accessibility to their mice and their computer. Wireless Mouse Technology Wireless mice usually work via radio frequencies commonly referred to as RF. RF wireless mice require two components to work properly – a radio transmitter and a radio receiver. RF Transmitter A radio frequency (RF) transmitter is usually Read More

Share on: