Advert

What is an SMB Protocol?

Last edited by . Total of 5 comments in the discussion.

The Server Message Block (SMB) protocol is designed to support file sharing, serial ports, printers, and other communications interfaces such as mail slots and named pipes established between two or more computers. The protocol can be used on top of the TCP/IP or other network protocols such as NetBEUI on the Internet. SMB primarily allows client programs or applications to read, write, create, and update files on a remote server. How does the SMB Protocol Work? SMB functions as a request-response or client-server protocol. The only time that the protocol Read More

Share on:

Detection and Removal of Internet Speed Monitor

Last edited by . Total of no comments in the discussion.

Browser helper objects (BHOs) are primarily software programs that enable website authors to gain control and customize different components of IE. Usually, BHOs get loaded whenever IE browser starts and tend to share IE’s memory context. “Internet speed monitor” is a type of browser helper object. Simply, an “Internet Speed Monitor” can be termed as an extremely irritating and invasive Adware toolbar program that gets installed into the system through an adware called BndDrive, thereby generating an uncontrolled stream of popup advertisements that are titled “internet speed monitor”. In this, Read More

Share on:

Magnetorheological Fluid

Last edited by . Total of 2 comments in the discussion.

Magnetorheological fluid or MR fluid is a special material used for building smart structures that can withstand earthquakes. The Magnetorheological fluid can change from liquid to solid and vice versa. It makes the buildings of which it is a component particularly flexible so they can adapt to external force that would have made other more rigid buildings snap. The Need for Smart Structures Traditional belief in structural engineering dictates that the more rigid a building is, the better it will be able to stand up to strong earthquakes and strong Read More

Share on:

How to Record a Show from DVR to a Computer

Last edited by . Total of no comments in the discussion.

Many people these days have a DVR attached to their television set that allows them to pause, record, and playback TV shows and movies whenever they want. While this provides consumers with much-appreciated accessibility and flexibility, a growing trend worldwide is to connect a DVR to a computer in order to watch TV shows and movies on a desktop computer or take them on the go by connecting the DVR to a laptop. In this article, we will show you several methods that allow you to record shows from your Read More

Share on:

Locate My Lost Cell Phone

Last edited by . Total of no comments in the discussion.

Many of us have lost our cell phones from time to time but some may have a harder time than others in retrieving their phone. What is worse is when you lose your cell phone in the middle of a texting session or when you have an important phone call to make and the person's contact information is in your cell phone. Whatever the reason, this article will provide you with detailed methods of finding your lost cell phone as quickly as possible so that you can continue with your Read More

Share on:

How to Convert Word to PDF

Last edited by . Total of 28 comments in the discussion.

Portable Document Format (PDF) is a file format that the Adobe Corporation developed. It is used to easily transfer documents via the Internet. PDF files are protected from changes and retain a presentation’s exact elements, thereby avoiding problems like missing fonts or broken layouts. PDF files can be viewed with Adobe Acrobat Reader, an easily downloadable application for Windows and Mac OS X. A number of equivalents are available on Linux as well. Converting MS Word Documents to PDF Sending a uniform file to many recipients, transferring files from one Read More

Share on:

How to Change an IP Address on Solaris

Last edited by . Total of no comments in the discussion.

To change an IP address on a Solaris system immediately, use the `ifconfig` command. The syntax for `ifconfig` is: ifconfig <interface> <ip address> <netmask> <broadcast address> If the user does not know his/her network interface names, he/she should use the `ifconfig -a` command to list all of the available network interfaces. Permanently Change an IP Address on Solaris To make this change permanent, users need to edit one or more Solaris configuration files. If they do not, then their IP address will change back to the old address the next Read More

Share on:

IPSec Policies

Last edited by . Total of no comments in the discussion.

IPSec Policies Overview IPSec encrypts data information contained in IP datagrams through encapsulation to provide data integrity, data confidentiality, data origin authentication, and replay protection. The two main IPSec components that are installed when you install IPSec are the IPSec Policy Agent and the IPSec driver. The IPSec Policy Agent is a service running on a Windows Server 2003 computer that accesses IPSec policy information. The IPSec Policy Agent accesses the IPSec policy information in the local Windows registry or in Active Directory. The IPSec Policy Agent then passes this Read More

Share on:

How to Recover Deleted E-Mails from Outlook Express

Last edited by . Total of 7 comments in the discussion.

There is generally no way to recover deleted emails from Outlook Express. However, there are some exceptions to this. Outlook users may normally delete each email after reading it. While doing this, the user may discover that he/she accidentally deleted an email that was important. If his/her Outlook Express account is set up to automatically delete emails when Outlook Express is closed and he/she has not closed Outlook Express, all he/she has to do is go into deleted emails and retrieve the desired email. If Outlook Express is set up Read More

Share on:

Binary Tree – Searching a Node

Last edited by . Total of no comments in the discussion.

An element in a binary search tree can be searched very quickly. A search operation on binary tree is similar to applying binary search technique to a sorted linear array. The element to be searched will be first compared with root node. If it matches with the root node then the search terminates. Otherwise search is continued in the left sub tree if the element is less then the root or in the right sub tree if the element is greater then the root. Suppose we try to find a Read More

Share on: