Advert

What is Luminol?

Last edited by . Total of 1 comment in the discussion.

Luminol is a substance that has a blue or green glow when it comes in contact with blood, certain metals, or other oxidizing agents. It is made from hydrazine and hydrogen peroxide and exhibits chemiluminescence, the process by which light is emitted from a chemical reaction. Luminol has many uses, but is most widely used for crime scene investigation and forensic science. This is because trace amounts of iron found in hemoglobin, a substance found in blood that is responsible for carrying oxygen throughout the body, activates luminol. How Luminol Read More

Share on:

How Does Cloud Computing Work?

Last edited by . Total of 5 comments in the discussion.

Cloud computing refers to the delivery of one or many services powered by computer hardware and software over the Internet or local computer network. For most major service providers, there are a large number of computers configured in a grid to provide the service architecture located in the “cloud.” The origin of the name cloud comes from the original representation of the Internet with the cloud symbol and in systems diagrams that use a cloud symbol to represent the complex underlying infrastructure. As services in this domain become more prevalent, Read More

Share on:

Cybersquatting

Last edited by . Total of no comments in the discussion.

Cybersquatting refers to using, trafficking in or registering a domain name with the intention of taking advantage of the popularity of another company’s trademark. These cybersquatters generally register these domains before the target company, thus forcing the latter to buy the domain from them at a higher price. Cybersquatting comes from the term squatting, which describes the act of occupying a land, building or any other property without the knowledge or permission of the owner. In a sense, cybersquatting entails cybersquatters registering a company or a trademark for his domain Read More

Share on:

How Does an iPad Connect to the Internet?

Last edited by . Total of no comments in the discussion.

An iPad is a tablet PC that Apple produced, which combines the functionality of a Macbook, iPhone, iPod Touch, and e-reader into one portable device. An iPad is much larger than an iPhone, but is smaller than a Macbook, allowing users to perform a wide variety of tasks from virtually anywhere. iPads have touch screen capabilities and are able to connect to the Internet in several different ways, including via an Ethernet connection, Wi-Fi, Bluetooth, and/or 3G.   Ethernet Like all other types of computers, iPads are able to connect Read More

Share on:

Java vs. C++

Last edited by . Total of 1 comment in the discussion.

C++ supports pointers; Java does not (Java does have object references) C++ supports mutiple inheritance directly; Java supports multiple inheritance only through interfaces C++ supports operator overloading; Java does not C++ supports global variables; Java does not (sort of) C++ supports #define; Java does not C++ supports typedef; Java does not C++ supports enum; Java does not C++ supports unions; Java does not C++ supports structs; Java does not C++ supports constants; Java supports final variables

Share on:

DirectX

Last edited by . Total of no comments in the discussion.

DirectX, formerly known as the Game SDK, is a term given for a collection of Windows APIs (Application Protocol Interface) for easily handling tasks related to game programming on the Microsoft Windows Operating System. This set of development libraries for high performance games allows software developers "direct access" to the low-level functions of PC peripherals. DirectX access is the hardware abstraction layer in Windows. DirectX APIs The various components of DirectX are DirectX Graphics, DirectInput, DirectPlay, DirectSound, DirectMusic, DirectSetup, and DirectX Media Objects. The various components comprising DirectX are in Read More

Share on:

Computer Ports

Last edited by . Total of 2 comments in the discussion.

With each day that passes, we rely more and more on computers for all facets of our lives in the information age. Every aspect of daily life from financial matters, health issues, and leisure time all have ties to the World Wide Web and, ultimately, computers now. For some, their computer is their livelihood. For even more, their computer provides them a crucial resource for information, communication, and organization. One reason that computers are able to accomplish all of these remarkable feats that shape our lives is their ability to Read More

Share on:

Active Directory Authentication Types

Last edited by . Total of no comments in the discussion.

The two types of authentication are Mutual Authentication and NTLM. Mutual Authentication requires both the server and the client to identify them. NTLM only requires the client to be validated by the server. Two types of authentication are Mutual Authentication and NTLM Authentication. Mutual Authentication Mutual Authentication is a security feature in which a client process must prove its identity to a server, and the server must prove its identity to the client, before any application traffic is sent over the client-to-server connection. Identity can be proved through a trusted Read More

Share on:

How to Encrypt an entire Disk

Last edited by . Total of no comments in the discussion.

Sometimes instead of encrypting a file or a set of files, you want to encrypt an entire file system, partition, or disk. One of the chief advantages of this approach is that, once you have entered your encryption key, the encryption becomes transparent to both you and your applications. When you power off your computer, your data is securely encrypted. It is the best of both worlds. What is Whole Disk Encryption Whole disk encryption is a process in which every bit of data that is on a disk is Read More

Share on:

Active Directory Operations Masters

Last edited by . Total of no comments in the discussion.

When a change is made to a domain, the change is replicated across all of the domain controllers in the domain. Some changes, such as those made to the schema, are replicated across all of the domains in the forest. This replication is called multimaster replication. But few changes are practically not possible to perform with multimaster replication, so a domain controller known as Operations Master takes such type of changes to perform. Five Operations Master Roles are given to one or more domain controllers in each forest. Operations Master Read More

Share on: