Advert

How to Zip a File

Last edited by . Total of no comments in the discussion.

The ability to zip a file allows for a file that might be large in size to be shrunk down into a size that saves close to 80% of the space that it would have used without being zipped. When it is this size, sending the file over email becomes considerably easier because it fits within the size parameters. Finally, a level of security can be added–encryption to be exact–to the zipped file so that people cannot access it unless you want them to. Creating a Zip File on Windows Read More

Share on:

What Are Default Passwords?

Last edited by . Total of 2 comments in the discussion.

The following are default usernames and passwords for many systems: AS/400 qsecofr qsecofr /* master security officer */ qsysopr qsysopr /* system operator */ qpgmr also qpgmr /* default programmer */ ibm password ibm 2222 ibm service qsecofr 1111111 qsecofr 2222222 qserv qserv qsvr qsvr secofr secofr qsrv ibmce1 DECserver ACCESS SYSTEM Dynix (The library software, not the UnixOS) setup <no password> library <no password> circ <Social Security Number> (Type ‘later’ to exit to the login prompt)   Hewlett Packard MPE-XL HELLO MANAGER.SYS HELLO MGR.SYS HELLO FIELD.SUPPORT HPUNSUP or SUPPORT Read More

Share on:

Where to Submit Articles for Publication

Last edited by . Total of 8 comments in the discussion.

One method for getting high-quality links is to write quality articles and submit them to other web sites for publication.Each article should include a link back to your web site. These links are better than links from link pages, because there tend to be very few outbound links on the article page. Write a brief article on some topic related to the topic of your web site. Do not write an article about your web site, but write an article that would be interesting to people who would also be Read More

Share on:

Access Control

Last edited by . Total of no comments in the discussion.

Access control is the execution of limitations and restrictions on whoever tries to occupy a certain protected property, thereby keeping people as safe as possible. As modern society moves further into the cyber age, these access control systems become almost completely computer controlled. This article will further explain what access control is, how it works, and will list the different types. What is Access Control? Access control is the term used to describe how a person, mechanical device, or computer system uses both physical barriers and alarms to keep an Read More

Share on:

How to Clear the ARP Cache

Last edited by . Total of 40 comments in the discussion.
Clear ARP Cache

ARP (Address Resolution Protocol) Cache is a technique used to store “mappings” of  OSI Model Network Layer addresses (IP addresses) to corresponding OSI Model Data Link addresses (MAC addresses). Due to a variety of possible circumstances, ARP cache can become damaged requiring the end user or administrator to determine how to clear the ARP cache for the respective computer system or device. Symptoms that the ARP cache requires clearing include the computer’s operating system failing to function properly, numerous websites failing to load, and interruptions in network or Internet connectivity. Read More

Share on:

How to Audit Unix Passwords

Last edited by . Total of no comments in the discussion.

To audit Unix passwords, you must compare each encrypted password in the Unix password file with a set of potential encrypted passwords. These potential encrypted passwords are created by encrypting every password in a list of plaintext passwords. This is an example of a dictionary attack. The Unix passwd File Location The traditional location for the Unix password file was /etc/passwd. Unix password file format An entry in the Unix password file consists of seven colon delimited fields: Username Encrypted Unix password (And optional password aging data) User number Group Read More

Share on:

How to Fix Error 0x80070570

Last edited by . Total of 1 comment in the discussion.

Error code 0x80070570 is one of the most common errors on computers. The error typically shows up on the screen as a message. It is important to repair the computer as soon as a message with this error code appears as it can seriously damage the system. It causes a computer to perform slowly and inefficiently. The error also locks up programs and freezes up computer hardware. Error code 0x80070570 can occur for multiple reasons. The most common reason is when Microsoft updates are setup on a computer. The error Read More

Share on:

Web Mail

Last edited by . Total of 3 comments in the discussion.

Web mail is one of the most useful web applications on the Internet, it allows you to access, send, receive and manage your email through a web browser. The great part of web mail is that you can access your email from almost any computer around the world, as long as it has a internet connection and web browser. Web mail differs from traditional email in which most people set up an email client on one computer, thus making their only access point at one specific computer and only one Read More

Share on:

J2EE

Last edited by . Total of 1 comment in the discussion.

J2EE is Java 2 Enterprise Edition. J2EE is Sun’s preferred Java platform for multi-tier enterprise applications. J2EE enhances J2SE with: Enterprise JavaBeans components Java Servlets API JavaServer Pages XML For more information on J2EE, visit J2EE.

Share on:

How Do X-Rays Work?

Last edited by . Total of no comments in the discussion.

An X-ray is an electromagnetic wave that has a shorter wavelength than visible light and is created when an electrical current passes through an x-ray tube. When the current passes through the tube, the resulting radiation beam is an x-ray. This beam can penetrate objects or materials that consist of light atoms, but objects made of heavy atoms will absorb it. This quality makes X-rays useful for detecting bone fractures and for studying the structure of materials. When were X-Rays Discovered? German physicist Wilhelm Roentgen was the first scientist to Read More

Share on: