Advert

Sudo

Last edited by . Total of no comments in the discussion.

`Sudo` is an enhanced alternative to the Unix `su` command. Sudo stands for “su do,” and means “do something as the supervisor.” Sudo’s Capabilities Sudo allows system administrators to control who can run some (or all) commands as root. This ability to restrict users can be configured on a per-host basis, and is a much more flexible way of controlling what commands a user may perform. Sudo allows users to perform certain, selected commands as if they were the UNIX root account, but because Sudo is customizable to give selective Read More

Share on:

Half Duplex and Full Duplex

Last edited by . Total of 4 comments in the discussion.

Duplex simply means that the communications device enables users to talk to someone in another location and the person in the other location to respond to the user via the same type of device. As an example, when someone makes a telephone call, he/she is engaging in a duplex procedure. The same is true when voice to voice communication is done via a computer. Examples of Half Duplex Devices and How They Work In contrast, a half duplex enables only one party to speak at a time. The best example Read More

Share on:

What is a Balun?

Last edited by . Total of no comments in the discussion.

A balun is an electrical transformer that is used to convert electrical signals to and from balanced and unbalanced signals. They are normally used to connect lines that have different levels of impedance and are commonly used in the home for connecting HD and traditional antennas. Baluns are also used throughout industry, although it is not necessarily obvious when one is being used. What are the Types of Baluns? Autotransformer Balun – The autotransformer balun uses two coils that are placed tightly together on a ferrite rod. They are then Read More

Share on:

BS7799

Last edited by . Total of no comments in the discussion.

ISO17799 and BS7799 are security policies and standards procedures. The standard was initially known as a British standard called BS 7799, developed by the British Standards Institution. Later, it became the ISO IEC 17799 standard when it was adopted by the ISO IEC technical committee for international use. Such a committee is called ISO IEC JTC 1 and is currently responsible for all information regarding technology standards, and the BS7799 refers specifically to Information Security Management Standard formally approved during the year 2000. This standard defines a set of recommended Read More

Share on:

POS Systems

Last edited by . Total of no comments in the discussion.

POS stands for Point of Sale; POS technology is used mainly at retail locations such as stores, supermarkets, restaurant, etc. When a customer would like to purchase an item or pay a bill a POS system is extremely useful to register the purchase, keep track of inventory, purchase details such as time, date and store location and input all this data into a database which then can be used for data mining purposes. POS systems have changed the face of retail. Now, a small or large business can easily keep Read More

Share on:

goto Statement

Last edited by . Total of no comments in the discussion.

In programming, significance has always been given to use of structured programming technique to build reliable software that are easy to debug, maintain and modify. In some cases, performance is more important than strict obedience to structured programming technique. In these cases, some unstructured programming technique may be used. For example, we can use break to terminate execution of a repetition structure before the loop continuation condition becomes false. This saves unnecessary repetition of the loop if the task is completed before loop termination. Another instance of unstructured programming is Read More

Share on:

How to Change an Operating System

Last edited by . Total of no comments in the discussion.

An operating system is a computer’s core processing software, especially in the case of home computers. Operating systems provide the user with a graphical interface in which the user can interact with the computer itself. There are many operating systems available, most of which differ in design, function, and capabilities. However, most operating systems provide a core workstation (desktop), file storage, a taskbar, and a number of programs that assist the user in everything from calculations and networking to word processing and email. Backup The first thing to do when Read More

Share on:

Using SMS Network Management Components

Last edited by . Total of no comments in the discussion.

Using Network Monitor The key administration tasks which you can perform using Network Monitor are summarized below: You can capture frames directly from the network which you are monitoring. You can configure capture filters to specify the type of information which should be captured by Network Monitor. You can view captured frames immediately once the capture is complete, or at some later stage. You can filter captured frames by creating display filters. This allows you to find specific information in a capture. You can create triggers if you want certain Read More

Share on:

How to Reset a Xbox 360

Last edited by . Total of 3 comments in the discussion.

There are many reasons why someone might want to reset their X-Box 360. The first might be because their display settings have become warped and they want to get back to the previous settings that worked. Or, they might have installed something onto the console and now it is not running properly. And, no matter how hard you try, you simply cannot remove it from the system. Both issues can be easily fixed. X-Box 360 Default Display If there is a disc in the 360, remove it. Then turn off Read More

Share on:

Active Directory Replication

Last edited by . Total of 6 comments in the discussion.

The initial Windows NT versions were designed as single master network environments. The primary domain controller (PDC) was responsible for managing the domain database’s master copy. The PDC was therefore responsible for replicating any changes to the backup domain controllers (BDCs). In these environments, any changes had to be performed on the PDC, which then replicated these database changes to the BDCs. What this meant was that in cases where the PDC was unavailable, no changes were made to the domain database. From this simple discussion, it is clear that Read More

Share on: