`Sudo` is an enhanced alternative to the Unix `su` command. Sudo stands for “su do,” and means “do something as the supervisor.” Sudo’s Capabilities Sudo allows system administrators to control who can run some (or all) commands as root. This ability to restrict users can be configured on a per-host basis, and is a much more flexible way of controlling what commands a user may perform. Sudo allows users to perform certain, selected commands as if they were the UNIX root account, but because Sudo is customizable to give selective Read More
Half Duplex and Full Duplex
Duplex simply means that the communications device enables users to talk to someone in another location and the person in the other location to respond to the user via the same type of device. As an example, when someone makes a telephone call, he/she is engaging in a duplex procedure. The same is true when voice to voice communication is done via a computer. Examples of Half Duplex Devices and How They Work In contrast, a half duplex enables only one party to speak at a time. The best example Read More
What is a Balun?
A balun is an electrical transformer that is used to convert electrical signals to and from balanced and unbalanced signals. They are normally used to connect lines that have different levels of impedance and are commonly used in the home for connecting HD and traditional antennas. Baluns are also used throughout industry, although it is not necessarily obvious when one is being used. What are the Types of Baluns? Autotransformer Balun – The autotransformer balun uses two coils that are placed tightly together on a ferrite rod. They are then Read More
BS7799
ISO17799 and BS7799 are security policies and standards procedures. The standard was initially known as a British standard called BS 7799, developed by the British Standards Institution. Later, it became the ISO IEC 17799 standard when it was adopted by the ISO IEC technical committee for international use. Such a committee is called ISO IEC JTC 1 and is currently responsible for all information regarding technology standards, and the BS7799 refers specifically to Information Security Management Standard formally approved during the year 2000. This standard defines a set of recommended Read More
POS Systems
POS stands for Point of Sale; POS technology is used mainly at retail locations such as stores, supermarkets, restaurant, etc. When a customer would like to purchase an item or pay a bill a POS system is extremely useful to register the purchase, keep track of inventory, purchase details such as time, date and store location and input all this data into a database which then can be used for data mining purposes. POS systems have changed the face of retail. Now, a small or large business can easily keep Read More
goto Statement
In programming, significance has always been given to use of structured programming technique to build reliable software that are easy to debug, maintain and modify. In some cases, performance is more important than strict obedience to structured programming technique. In these cases, some unstructured programming technique may be used. For example, we can use break to terminate execution of a repetition structure before the loop continuation condition becomes false. This saves unnecessary repetition of the loop if the task is completed before loop termination. Another instance of unstructured programming is Read More
How to Change an Operating System
An operating system is a computer’s core processing software, especially in the case of home computers. Operating systems provide the user with a graphical interface in which the user can interact with the computer itself. There are many operating systems available, most of which differ in design, function, and capabilities. However, most operating systems provide a core workstation (desktop), file storage, a taskbar, and a number of programs that assist the user in everything from calculations and networking to word processing and email. Backup The first thing to do when Read More
Using SMS Network Management Components
Using Network Monitor The key administration tasks which you can perform using Network Monitor are summarized below: You can capture frames directly from the network which you are monitoring. You can configure capture filters to specify the type of information which should be captured by Network Monitor. You can view captured frames immediately once the capture is complete, or at some later stage. You can filter captured frames by creating display filters. This allows you to find specific information in a capture. You can create triggers if you want certain Read More
How to Reset a Xbox 360
There are many reasons why someone might want to reset their X-Box 360. The first might be because their display settings have become warped and they want to get back to the previous settings that worked. Or, they might have installed something onto the console and now it is not running properly. And, no matter how hard you try, you simply cannot remove it from the system. Both issues can be easily fixed. X-Box 360 Default Display If there is a disc in the 360, remove it. Then turn off Read More
Active Directory Replication
The initial Windows NT versions were designed as single master network environments. The primary domain controller (PDC) was responsible for managing the domain database’s master copy. The PDC was therefore responsible for replicating any changes to the backup domain controllers (BDCs). In these environments, any changes had to be performed on the PDC, which then replicated these database changes to the BDCs. What this meant was that in cases where the PDC was unavailable, no changes were made to the domain database. From this simple discussion, it is clear that Read More
Share on: