Advert

Personal RFID Tracking Units

Last edited by . Total of no comments in the discussion.

Personal RFID tracking units are personal tracking units that depend on RFID or Radio Frequency Identification technology. Personal RFID tracking units allow users to identify and locate objects and individuals within a specific facility or area. Although personal RFID tracking units are not as popular or as common as other forms of personal tracking units and are rarely integrated into other devices such as GPS, they can be used for many of the same purposes. While personal RFID tracking units can be used in a wide range of applications, they Read More

Share on:

How to Modify the IRC Client to Hide Your Real Username

Last edited by . Total of no comments in the discussion.

Note: This FAQ answer was written by someone else, but I do not know who. If you know who originally wrote this, please e-mail me. Applying these changes to the source code for your ircII client and recompiling gives you a new ircII command: /NEWUSER. This new command can be used as follows: /NEWUSER <new_username> [new_IRCNAME] <new_username> is a new username to use and is required [new_IRCNAME] is a new IRCNAME string to use and is optional This will disconnect you from your server and reconnect using the new information Read More

Share on:

Anonymous Proxy Lists

Last edited by . Total of 11 comments in the discussion.

Anonymous proxies appear on the Internet constantly, often only to disappear rapidly when their owners discover the bandwidth cost. To help users find a current anonymous proxy server, dedicated individuals maintain anonymous proxy lists. Anonymous Proxy Server Lists We maintain our own anonymous proxy list that users can access by clicking the Proxy Sites button on the top menu. In addition, these other websites also maintain frequently updated lists of anonymous proxy servers on the Internet: Ros Instrument Atom Intersoft Cybersyndrome Multiproxy Proxz Public Proxy Servers.com/ Proxy 4 Free Stay Read More

Share on:

How to Delete Internet History

Last edited by . Total of 1 comment in the discussion.

Deleting Internet history clears the record of web sites visited. This procedure helps keep Internet browsing private.  Below are steps to manually delete Internet files from the computer: Delete Internet History in Internet Explorer By default, Internet Explorer keeps Internet history for 20 days. To delete Internet history in Internet Explorer, open the Tools menu, select “Internet Options,” click the “Delete…” button under “Browsing history,” make sure that “History” is selected in the dialog that pops up, and click the “Delete” button. Under “Browsing history” it is also possible to Read More

Share on:

Browser Cookie

Last edited by . Total of no comments in the discussion.

A browser cookie is a small piece of information sent by a web server to a web browser to be stored for future use. The data in the browser cookie will be sent back to the web server whenever the browser reconnects to the web site. Cookies are commonly used to store user preference information, such as web site options. Cookies are also used to store shopping cart contents. Cookies are also used to store authentication data, such as user names and passwords. How Websites Use Cookies Cookies are extremely Read More

Share on:

How to Clear Your Cache

Last edited by . Total of 3 comments in the discussion.

Most web browsers store web pages and images that we browse on the Internet. The web browsers cache (meaning, temporarily store) these files for a short time in your computer. If we revisit a pre-visited web page while these files are still in the cache, the web browser retrieves the files from the disk cache instead of getting these files from the web site. This can significantly speed up web browsing, but it may not render the updated web page in some cases. The web browser cache can cause privacy Read More

Share on:

How to Bypass Websense

Last edited by . Total of 45 comments in the discussion.
Websense

Many businesses and government institutions use a content filtering program such as Websense to keep employees from visiting certain websites while at work. These programs can either prohibit the use of certain websites or monitor all of the sites that employees visit while in the office. Websense blocks several website categories: adult material, entertainment, drugs, games, sports, Internet communication, peer-to-peer file sharing, gambling, instant messaging, health, illegal, shopping, job search, Internet telephony, religion, special events, travel, violence, weapons, advertisements, freeware and software download, pay-to-surf, malicious websites, and many more. The Read More

Share on:

How to Securely Erase Data

Last edited by . Total of 1 comment in the discussion.

When you erase a file on your computer, the actual data in the file is not overwritten. The space utilized by that file is simply marked as “free” for use by other data. Once other data is written in that space, the original data becomes unrecoverable — by most people. Those little bits of magnetic media that store 0’s and 1’s are a bit more complex, however. With sensitive and sophisticated equipment, it is theoretically possible to recover data even after it has been written over. The method to securely Read More

Share on:

How to Delete Google History

Last edited by . Total of no comments in the discussion.

For many different reasons, people want to delete their search engine history. To delete history using either Internet Explorer or FireFox requires going into the options and erasing them manually. However, if you have the Google Toolbar installed on your site, you are able to erase your search history with just two clicks. Regardless, the process of erasing history takes about thirty seconds. Erasing History on Internet Explorer and FireFox To erase history on Internet Explorer and FireFox is easy. Go to the top and click tools. Then scroll to Read More

Share on:

Folder Locker

Last edited by . Total of no comments in the discussion.

Computers have provided modern society with many different luxuries that were never available before. Users are able to download new files in a matter of minutes, access the Internet, and store many different files on their computers. With this ability to store information, however, comes the responsibility of guarding it. As computers are widely accessible to anyone who sits down in front of one, the primary user of that computer may need to protect certain information that he/she does not want others to see. This article will list a number Read More

Share on: