Cisco IOS As you know that Cisco is the worldwide leader in providing the hardware solutions as well as the software solutions of LAN and WAN. The hardware solutions mean that the hardware devices such as switches and routers etc but what is the meaning of software solution? The software solution actually means that Cisco manufactures manageable devices with a CLI based Cisco IOS Software installed in these devices. With the help of this software you can better manage your network and internetwork environment. Once you have performed and inspection Read More
Lithium Polymer Batteries
Lithium Polymer batteries are a type of Lithium Ion rechargeable battery. Lithium Polymer batteries utilize a dry polymer which enables them to be manufactured in a greater variety of shapes and sizes than Lithium Ion batteries. Lithium Polymer batteries also utilize a gelled electrolyte to increase conductance. These batteries may be more correctly referred to as Lithium Ion Polymer batteries. Lithium Polymer Battery Pros and Cons Pros: Flexible form factor – Lithium Polymer batteries can be manufactured in a wide range of shapes and sizes Lightweight – Lithium Polymer batteries Read More
Free Recording Software
Recording software refers to a type of program that is able to record audio, text, or video. There are many different types of recording software and most conveniently have several different features bundled together. The most common type of recording software is used to record audio with the aid of a microphone or other audio source. However, software for recording emails, cursor movements, and accessed files exist. While many recording programs have a fee associated with them or have to be purchased, there are several recording programs that are completely Read More
Wireless Connection Security
Wireless Network Security Threats Wireless networks do not have the inbuilt physical security of wired networks, and are unfortunately more prone to attacks from intruders. Once unauthorized access is gained to the wireless network, the intruder would be able to easily access the resources of the corporate, internal network. To complicate matters, there are numerous tools which attackers can use to detect and connect to a wireless network, thus making abusing a wireless network not an intricate task. The types of attacks that wireless networks are vulnerable to are listed Read More
Scope Resolution Operator
Occasionally, it is useful to distinguish between class member names and other names. The scope resolution operator (::) can be used here. For example class A { private: int x; float y; public: void readm() const; /* ——— ——— */ }; In this class the full name (qualified name) of variable x is A::x. Similarly, the qualified name of y is A::y and the qualified name of readm() is A::readm(). Global Variables and Class Member Variables with the Same Name What Read More
How to find a Unix command
Unix provides hundreds of useful commands for all sorts of purposes, but it is sometimes difficult to find the specific command you are looking for. To assist you with this task, most versions of Unix provide the `man -k` command. The `man -k` command searches the online manual pages to help you find the Unix command for which you are looking. For example, suppose you forgot the command to backup your Unix system. You might search for the word backup: $ man -k backup dump(8), rdump(8) – file system backup Read More
Phone Prefixes
Phone prefixes are the codes that tell the phone companies which state, city, or county a person is calling from. As more people move to an area the phone prefixes change and additional ones are added. Depending on the state, there may only be a few prefixes. Prefixes help to differentiate between each person's phone numbers and to organize all the numbers. They also list the names of all the people who have phones – including cell phones. Landlines and Cell Phones Prefixes also tell us which numbers are cell Read More
How to Change a WEP Key
A WEP (Wired Equivalent Privacy) key is a type of security algorithm for wireless devices that protects a computer from hackers and people who are trying to access someone else’s Internet connection. It consists of the numbers 0-9 and the letters A-F and can be 10, 26, or 58 characters long. For devices within the same wireless network to communicate with each other, the user must enter the same WEP key on each device. To make this easier, many devices are equipped with software that converts a regular text-based password Read More
Rheostat
A rheostat is an electrical component that has an adjustable resistance. It is a type of potentiometer that has two terminals instead of three. The two main types of rheostat are the rotary and slider. The symbol for a rheostat is a resistor symbol with an arrow diagonally across it. Rheostats are used in many different applications, from light dimmers to the motor controllers in large industrial machines. Rheostat Construction Most rheostats are the wire-wound type that have a long length of conductive wire coiled into a tight spiral. The Read More
192.168
The Internet Assigned Numbers Authority (IANA) has allocated three IP address ranges that are to be exclusively used for private Internet networks: 10.0.0.0 – 10.255.255.255 (10/8 prefix) 172.16.0.0 – 172.31.255.255 (172.16/12 prefix) 192.168.0.0 – 192.168.255.255 (192.168/16 prefix) The first block “10.0.0.0 – 10.255.255.255” is referred to as the 24-bit block, the second “172.16.0.0 – 172.31.255.255” as the 20-bit block, and the third and final block “192.168.0.0 – 192.168.255.255” is referred to as the 16-bit block. 192.168.0.0 – 192.168.255.255 is a set of 256 contiguous Class C network numbers. (IP addresses Read More
Share on: