Advert

List of Bad Web Robots

Last edited by . Total of no comments in the discussion.

This list of bad web robots was originally compiled by funender. Some of these robots are designed to copy entire web sites, which can utilize a great deal of bandwidth. Others harvest e-mail addresses for spammers. Most benefit their owners, while providing absolutely no benefit to the web site owner. You must decide for yourself what qualifies as a bad web robot. Here is a list of robots that you may wish to exclude, in robots.txt format: User-agent: Alexibot User-agent: Aqua_Products User-agent: BackDoorBot User-agent: BackDoorBot/1.0 User-agent: Black.Hole User-agent: BlackWidow User-agent: Read More

Share on:

DirecTV Slimline Dish

Last edited by . Total of no comments in the discussion.

The DirecTV Slimline Dish is a relatively recent addition to DirecTV’s collection of HD-enabled satellite dishes. A DirecTV Slimline Dish is roughly 18” tall and 22” oval. Since DirecTV satellites are positioned in the Southern Hemisphere, all DirecTV Slimline Dishes must have a clear view of the Southern sky in order to receive DirecTV services. When installed properly, however, a DirecTV Slimline Dish provides the user with clear, high-definition television and Internet. How DirecTV Slimline Dishes Work A DirecTV Slimline Dish works in the same manner as most other satellite Read More

Share on:

How to Add a Site Search Feature to Your Web Site

Last edited by . Total of 4 comments in the discussion.

A site search feature is an option to enable your web users to search your entire web site for the content they are looking for. The two general methods of implementing a site search are: Site Search Online Services Site Search Server Based Programs Site Search Online Services FreeFind is an online service that will automatically create, update and host a site search feature for you. FreeFind is free for personal use on sites with less than 32MB of HTML. FreeFind also creates a site map for your site. Google Read More

Share on:

Used Cisco Switches and Routers

Last edited by . Total of 3 comments in the discussion.

Used Cisco Cisco is a worldwide leader in providing the hardware and software solutions of LAN and WAN. The head office of Cisco Company is in San Francisco and the branches and authorized dealers of Cisco currently exist in most of the countries in the world therefore Cisco hardware devices are used in every region around the globe. The software solution provided by Cisco is the Cisco IOS software based on CLI (Command Line Interface) that is used in Cisco manageable devices. Used Cisco Equipment Cisco currently deals in various Read More

Share on:

The History of the Internet

Last edited by . Total of no comments in the discussion.

Introduction The Internet has truly revolutionized the world. From its extremely humble beginnings to its rapid growth, nothing in perhaps the history of the world has brought so much information to the masses and has helped individuals communicate with others. While the Internet might seem simplistic in theory, it took quite a few innovations to technologically get it where it is today. In a world where information was usually broadcasted from one central location to the masses, the Internet made it possible for each individual to communicate with others over Read More

Share on:

How to Use Microsoft Access

Last edited by . Total of no comments in the discussion.

Microsoft Access Microsoft Access is a program that ships with Microsoft Office and allows users to retrieve, store, and organize information from a wide variety of sources. Microsoft Access is ideal for small businesses, entrepreneurs, and those who simply wish to keep track of their finances better. Microsoft Access can perform many different tasks and includes a vast number of prebuilt applications that can be used to organize information in different ways and easily share that information with other users. User Interface Microsoft Access features an advanced user interface system Read More

Share on:

Flash Memory

Last edited by . Total of 1 comment in the discussion.

Flash memory is memory which retains its contents even after power is removed. Flash memory is a form of EAPROM (Electrically Alterable Programmable Read-Only Memory). Each bit of data in a flash memory device is stored in a transistor called a floating gate. The floating gate can only be accessed though another transistor, the control gate. The process the control gate uses to access the floating gate is a field emission phenomenon known as Fowler-Nordheim tunneling. Tunneling allows voltage to flow from the control gate to the floating gate through Read More

Share on:

Installing and Configuring NAT

Last edited by . Total of 2 comments in the discussion.

In Routing and Remote Access Service (RRAS), NAT can be used to provide basic Internet connectivity for small offices or home offices. NAT translates IP addresses and associated TCP/UDP port numbers on the private network to public IP addresses which can be routed on the Internet. Through NAT, host computers are able to share a single publicly registered IP address to access the Internet. NAT also offers a number of security features which can be used to secure the resources on your private network. The NAT service is integrated with Read More

Share on:

How to Work My SanDisk MP3 Player

Last edited by . Total of no comments in the discussion.

SanDisk is a popular electronics manufacturer that has a number of MP3 players on the market, including the Sansa player product line. SanDisk players are designed to sync and update with a computer running the Windows Operating System. SanDisk players’ storage capacity range from 512MB up with many of the recent models being able to play color videos, pick up radio stations, and have an expansion slot for a flash memory card. The large storage capacity of the player coupled with the flash memory card capability have made the SanDisk Read More

Share on:

Remote Access Security

Last edited by . Total of 2 comments in the discussion.

Remote Access Security Overview To protect your corporate data from attacks from intruders and from being accessed by unauthorized users, you need to plan for and implement remote access security. You should authenticate remote access clients attempting to establish a remote connection with the remote access server. To secure connections to the corporate network, you can configure properties that either allow remote access or deny remote access. You can also specify authorization using the source number or destination phone number as the basis. There are a number of strategies that Read More

Share on: