Advert

Free Online Spyware Remover

Last edited by . Total of 1 comment in the discussion.

Trend Micro Anti-Spyware for the Web Trend Micro Anti-Spyware for the Web is a free online tool that checks computers for spyware, and helps remove any infections discovered. When the detection process is complete, the tool will display a report describing the results including which if any, spyware was detected, and prompt you before beginning the removal process. Symptoms of spyware infections: Slow computer performance when opening programs or saving files Unwanted pop-ups Browser homepage hijacking Repeated change in your web browser’s home page Random error messages New and unexplained Read More

Share on:

How Do I Change My Home Page to Yahoo?

Last edited by . Total of 4 comments in the discussion.

Changing the home page for your web browser to Yahoo is fairly simple and can be done with the following instructions: Microsoft Internet Explorer Users of Microsoft Internet Explorer will need to select the Tools tab and select ‘Internet Options’.  This will pull up the Internet Options menu.  Selecting the General tab will show the Home page section.  The URL(s) to the proper Yahoo destination(s) should be placed in the field.  Using multiple URLs in Microsoft Internet Explorer will result in multiple start-up home pages being loaded in multiple tabs.  Read More

Share on:

Ham Radio

Last edited by . Total of no comments in the discussion.

More than three million people enjoy ham radio hobbies, which is basically amateur radio. These enthusiasts create a network of people that enjoy communicating with one another over different frequencies. However, ham radio operators do use a variety of methods to communicate with one another. The amateur radio operators are known as Hams, and they communicate with one another for fun, self-improvement, or even public service. These operators communicate by transmitting messages by voice, Morse code, or even messages through computers. There are some new ways that allow hams to Read More

Share on:

Soil Moisture Meters

Last edited by . Total of no comments in the discussion.

Soil moisture meters are devices used to measure the percentage of water found in potting or ground soil. They determine whether crops require watering or if their soil is over-saturated and require a drying out period to maintain the health of the plants. Soil moisture meters are not expensive and can be found at home and garden shops. Typical readouts on the meters range from 1 to 10 or give a color indication of red, yellow, or green. These readings correspond with the humidity of the soil being measured. How Read More

Share on:

NAM: Number Assignment Module

Last edited by . Total of no comments in the discussion.

The NAM (Number Assignment Module) is the EPROM (Erasable Programmable Read-Only Memory) in a mobile telephone which holds information such as the MIN (or MDN) and SIDH.  The data fields stored in a phone’s NAM vary between the various mobile telephone specifications, such as AMPS/NAMPS, GSM, PCS, CMDA.  In modern networks, NAMs can be reprogrammed Over-The-Air (OTA). Dual and Multi-NAM Phones Some mobile handsets are equipped with NAM’s which can hold multiple telephone numbers.  This enables the phone to have multiple telephone numbers from one carrier or telephone numbers from Read More

Share on:

Anonymous Proxy

Last edited by . Total of 18 comments in the discussion.

An anonymous proxy is a piece of software that protects web browsers’ privacy and anonymity from web site operators, Internet snoops, and even unfriendly governments. The anonymous proxy software resides on a proxy server. The web browser connects to the proxy server and the proxy server connects to the web server. The web server does not know who the user is, it only knows who the proxy server is. The proxy server does know who the user is,  so he/she had better choose a trustworthy proxy server. Features to Look Read More

Share on:

Address Munging

Last edited by . Total of no comments in the discussion.

Address munging is one of the ways through which people and organizations online can exchange email addresses without their email addresses being picked up by bots. As you know, email addresses all over the net – whether in chat rooms, forums, online forms, etc. – are harvested by special programs in the Internet and sold to bulk emailers. Address munging is done by making the email address unreadable to such harvester programs but understandable to humans. An example of this is the email address anonymous@yahoo.com that’s posted as anonymous at Read More

Share on:

Securing DNS Servers

Last edited by . Total of no comments in the discussion.

Domain Name System (DNS) is the primary name registration and resolution service used in Windows Server 2003. DNS provides a hierarchically distributed and scalable database; provides name registration and name resolution services, and service location for Windows 2000 and Windows Server 2003 clients; and locates domain controllers for logon. A DNS server is a computer running the DNS Server service that provides these domain name services. The common threats to DNS servers are: Denial-of-service (DoS) attacksoccur when DNS servers are flooded with recursive queries in an attempt to prevent the Read More

Share on:

hpboid.exe

Last edited by . Total of no comments in the discussion.

hpboid.exe is meant to be Hewlett Packard’s Status Server application. This file is installed by the drivers of some HP business laser printers; these printers are part of the Enterprise Configuration Agent (EAC) technology developed by HP. This technology enables the drivers to send automated queries to the printer, irrespective of it being a local resource or part of a network, and based on the output for the query, the printer’s physical configuration is automatically updated in the Windows printer configuration screen. Any new attachment that you connect to a Read More

Share on:

Athlon

Last edited by . Total of 1 comment in the discussion.

Athlon is a name for AMD’s main line of Intel-compatible CPUs. The Athlon line is designed to complete against the Intel Pentium CPUs. Athlon CPUs feature a L1 cache with 64KB of memory for data and another 64KB of memory for instructions. Athlon CPUs support MMX, 3DNow!, and SSE. Some models of Athlon CPUs also support SSE2. Athlon CPUs are designed to fit Socket-A or Socket-754 CPU sockets. Athlon CPUs are slowly being phased out in favor of the newer Athlon 64 family of CPUs.

Share on: