On a day-to-day basis when you use your computer you have the ability to organize the information on your hard drive any way you want. One of the easiest methods of organizing your hard drive is by function. This way you use one partition for the operating system, one for your applications and one for the data you create. When you partition your hard drive what you are really doing is dividing it into isolated sections. So when you partition a drive, each partition will then act as an individual Read More
VirtuSphere
The VirtuSphere is essentially a hollow sphere that is fitted with sensors. Because of this, it is capable of providing a user with an immersive virtual reality experience. Inside the VirtuSphere, a user can move about in a virtual reality world by the simple act of walking as he normally would outside of the sphere. The VirtuSphere is mounted on a special platform that enables the sphere to move with the user's movements. Sensors inside this platform provide information on the speed and direction of the user, making it seem Read More
VLAN Hopping
VLAN Hopping is one of the primary VLAN based attacks used by hackers to infiltrate network security. VLAN hopping is used to attack a network by sending packets to a port which is generally not accessible. VLAN hopping attacks are mainly conducted in the Dynamic Trunking Protocol and, in some cases; the attacks are targeted to the trunking encapsulation protocol (802.1q or ISL). The Dynamic Trunking Protocol is utilized for negotiating trunking on links between devices and the type of trunking encapsulation to be used. Types of VLAN Hopping Switch Read More
Facial Recognition System
Facial recognition systems are computer programs that are used for automatically identifying a person. Research on this technology started in the mid 1960s. This technology works by using several facial features in a person's image and comparing these with existing images in the database. Facial recognitions systems are used as an additional and mass security measure and are comparable to the other biometric security systems available today such as retina scanners, fingerprint scanners, etc. The Technology behind Facial Recognition Systems The first important factor in facial recognition systems is its Read More
Understanding the Cisco Three-Layer Hierarchical Model
Understanding the Cisco Three-Layer Hierarchical Model Hierachical network design helps us to make networks more reliable and predictable. Level by level design help to understand networking factions easily like, we can use tools like access lists at specific level and can avoid them from others. Cisco layer model consist of the following three layers. The Core layer The Distribution layer The Access layer Each layer plays a role and specific responsibilities are assigned to these three logical layers. These layers are same like the network layers of OSI reference model. Read More
Warshall’s Algorithm
The former method discussed is quite inefficient. Let us see if a more efficient method to compute path can be produced. Let us define the matrix path k such that path k [i][j] is true if and only if there is a path from node i to node j that does not pass through any nodes numbered higher than k (except, possibly, for i and j themselves). How can the value of path k+ J [i][j] be obtained from path k? Clearly for any i and j such that path Read More
Remote Administration
Remote Administration Overview When it comes to administering servers and desktops in secure organizations or large organizations, administrators would typically be found performing remote administration. This basically means that administrators would be using the Microsoft Management Console snap-ins or support tools remotely, to administer servers. For instance, through the Microsoft Management Console snap-ins, you have the option of connecting to remote systems. In fact, most administrative tasks which you can perform locally, you can perform remotely. With the introduction of Windows Server 2003, came increased support for remote administration. This Read More
How to Convert MP3 to AVI
The MP3 (MPEG-3) format is a compress audio file format widely popular for use on portable media players and for online playback of music. The AVI (Audio Video Interleave) format is a container file format created by the Microsoft Corporation that supports both audio and video content. A task that arises for end-users is the need to convert MP3 to AVI. The work can be conducted using online or software conversion tools at no to low cost to the consumer. Steps to Convert MP3 to AVI Using MediaConverter.org Step 1 – Read More
How to Solve the “Power Calibration Error”
The “Power Calibration Error” typically appears when someone attempts to burn a CD or DVD and the burner fails to write the CD or DVD. The error might also appear as a “Medium Speed Error.” Multiple factors can cause the error, but it is most likely to occur because the CD/DVD burner is not able to determine the Optimum Power Calibration rate. The Optimum Power Calibration rate is a test that is run before burning a CD or DVD to determine the optimal laser power needed to write the CD Read More
Stability Problems Caused by File Fragmentation
File and disk fragmentation usually causes problems in large networked companies where many people simultaneously save, retrieve and delete their work on a company’s servers. In an ideal scenario, people will be ‘lining up’ to use the company’s servers, allowing data management (especially storage and retrieval) to proceed in an orderly, logical, and sequential manner. In reality, people are working simultaneously. This results in pieces of data being stored on servers in a seemingly random manner, ending up in data fragmentation. The scale of fragmentation is such that even small Read More
Share on: