Advert

DNS (Domain Name System)

Last edited by . Total of 1 comment in the discussion.

Domain Name System (DNS) is an Internet Engineering Task Force (IETF) standard name service which enables applications and users to connect to hosts in TCP/IP based networks by specifying a name. DNS makes it possible to assign domain names to organizations independent of the routing of the numerical IP address. DNS is a hierarchically distributed database that creates hierarchical names that can be resolved to IP addresses. The IP addresses are then resolved to MAC addresses. DNS therefore provides the means for naming IP hosts, and for locating IP hosts when they are queried for Read More

Share on:

SHN

Last edited by . Total of no comments in the discussion.

SHN is a .wav file compression process that helps to improve the way audio source files are stored. The following is some background on the concept of SHN and some suggested applications. What SHN does SHN is used in audio compression processes. The idea behind SHN (or Shorten) is to compress an audio .wav file without losing any type of data associated with the source file. This can be contrasted with the MP3 file, which usually discards some information associated with the source file; this lost information cannot be recovered Read More

Share on:

PPP Authentication Protocols

Last edited by . Total of no comments in the discussion.

Windows Server 2003 and Windows XP support the following PPP authentication protocols: PAP or Password Authentication Protocol The oldest forms of authentication schemes used where the user credential are sent in plain text. This is not the securest form of passing authentication credentials as anybody can use a third party sniffer program and capture these clear text username and password as they are unencrypted. The next thing that would happens is the news of a server being compromised due to intruder attack. Avoid using PAP as much as you can. Read More

Share on:

Configuring DNS Clients

Last edited by . Total of no comments in the discussion.

Configuring DNS Client Settings Configuring DNS client computers typically entail the execution of the following administrative tasks: Setting the client computer names for each computer. The computer names that you configure should not be greater than 63 bytes. The name can only include: Uppercase letters; A – Z Lowercase letters; a – z Numbers; 0 – 9 Hyphens Configure a primary DNS suffix for the computer. The primary DNS suffix of the computer is the name of the Active Directory domain that the computer is a member of, by default. Read More

Share on:

Pay Per View

Last edited by . Total of no comments in the discussion.

Pay per view is usually defined as any TV entertainment that is purchased to be viewed once or for a set period of time. The most popular forms of pay per view programming are usually purchased and shown through cable TV or Satellite TV services. These programs include live sporting events such as boxing matches, football games, the Olympics, baseball games or special wrestling matches. In addition to sporting events, another popular venue for pay per view is first run movies on cable or satellite services. For instance, the normal Read More

Share on:

How to Open an NRG File

Last edited by . Total of no comments in the discussion.

An NRG file is a type of CD file format that the CD/DVD burning software, Nero Burning Rom created. NRG files burn ISO images to CDs in order to create bootable discs. Like ISO files, NRG files maintain a specific file structure and can contain large archives of data in a single file. While NRG files are rather popular, due to the popularity of Nero itself, there are only a few programs that are able to read, access, and create NRG files.   How NRG Files Work An NRG file Read More

Share on:

Configuring the ISA Firewall

Last edited by . Total of no comments in the discussion.

IP Packet Filter Overview Access rules and packet filtering should be configured on firewalls to control both source and destination addresses and ports. With packet filtering, you can manage the flow of IP packets to ISA Server and from ISA Server. Packet filtering inspects the header of each packet for protocol, port, and destination address and source address information. Packets are dropped if they are not explicitly allowed. IP packet filters can be configured when ISA Server is installed in either of these modes: Firewall mode Integrated mode Packet filters Read More

Share on:

Waste Oil Burners

Last edited by . Total of no comments in the discussion.

Waste oil is the term used to refer to any petroleum-based/synthetic oil that is no longer considered usable. This may be due to the presence of excessive impurities, loss of the oil’s original properties, or just from the oil being over-exposed to the elements. A classic problem for society has been how to dispose of waste oil that is generated from commercial or residential use. Waste oil burners were initially designed to get rid of oil that was no longer usable, but can now be used to create heat or Read More

Share on:

KVM Switch

Last edited by . Total of no comments in the discussion.

A KVM switch is a keyboard, video and mouse switch. KVM switches are extremely useful when controlling one or more computers or servers. With a KVM switch you can easily connect one keyboard, video monitor and mouse to a multitude of computers or servers. Usually KVM switches can control up to 64 computers at one time and you can even daisy chain your servers for your KVM switch to control more than that if need be. KVM switches are great for technicians who work at a data center or are Read More

Share on:

How Does ICQ Password Recovery Work?

Last edited by . Total of 2 comments in the discussion.

Methods of ICQ password recovery include: Resetting your ICQ password online Recovering stored ICQ passwords ICQ password brute force attack Reset your ICQ Password The easiest way to recover a ICQ password is to go to the ICQ Get a New Password page. To use this page, enter your ICQ number and ICQ will e-mail your ICQ password to an e-mail account associated with your ICQ number. If you no longer have access to the e-mail account(s) associated with the ICQ number, ICQ will refuse to assist you. Stored ICQ Read More

Share on: