Advert

SHA-1

Last edited by . Total of no comments in the discussion.

SHA stands for Secure Hash Algorithm. It consists of five hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). The five algorithms are SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. SHA-1 is the most commonly used of the SHA series. Hash algorithms are called secure when It is impossible to find a message that corresponds to a given message digest. It is impossible to find two different messages that produce the same message digest. If a message is changed even Read More

Share on:

Windows Registry Hacks

Last edited by . Total of no comments in the discussion.

Windows registry 'hacks' are commands incorporated into the Windows Registry with the aim of improving the system's efficiency, security or communications protocols. Knowing how to 'tweak' the registry can help ensure the security and efficiency of a computer system. What follows is a brief explanation of the system registry and some suggested 'hacks' to make a computer system more secure. What is the Windows Registry? The system registry is, literally, your computer's 'command and control' program. Technically, it is a database that contains the options and settings for the Microsoft Read More

Share on:

How to Configure Wireless Security

Last edited by . Total of no comments in the discussion.

Wireless security is used to limit the scope of users that have access to services you install when implementing a wireless access point or wireless router device. These devices are used to provide convenient intranet and/or Internet access without having to run cable through buildings or other areas of coverage where return on investment is low. There are two methods used with wireless systems today to limit access: Coverage Area Authentication and Authorization Mechanisms Coverage Area You can limit coverage area with an access point by using the proper antenna Read More

Share on:

Socket 423

Last edited by . Total of no comments in the discussion.

Socket 423 is a CPU socket used for early Intel Pentium 4 CPU’s, operating at up to 2GHz. Socket 423, also known as PGA423, is a pin grid array (PGA) socket with 423 pins arranged in a 39×39 matrix with 26×26 pins removed from near the center. Each Socket 423 is 2.1″ x 2.1″ (5.33cm x 5.33 cm). The Socket 423 was used by Intel for less than a year, from November 2000 to August of 2001.  Socket 423 only supported Pentium 4’s built with the Williamette core.  The fastest Read More

Share on:

How to Delete a GMail Account

Last edited by . Total of 2 comments in the discussion.

Closing a GMail account may be required for several reasons. People who create a Gmail account and no longer need it may want to close it. Closing a GMail account only takes a moment if these steps are followed: Step 1 – Getting Online Go online and open a Google browser. The Google.com address is usually the simplest to navigate from. Step 2 – Signing into Google Accounts Click the “Sign In” option in the top right corner of Google. This will prompt you to sign into your Google account. Read More

Share on:

What is an IP Camera?

Last edited by . Total of 1 comment in the discussion.

An IP camera is a closed-circuit television camera that sends image data over a internet Protocol through an Ethernet connection. Because of their connectivity to the Internet, they are often times referred to as network cameras. Their primary use is in surveillance and, when connected to a digital video recorder (DVR), they can act as a powerful video surveillance system. Features of IP Camera The first main feature of an IP camera is the two way audio built into it. This makes it possible for someone in the control room Read More

Share on:

How to Use Google

Last edited by . Total of no comments in the discussion.

Google is the most widely used search engine on the web. It has a 65% market share and despite the fact that Yahoo and Bing are gaining some traction, it continues to rank as the favorite. While doing a very basic search on Google is very simple, searching for anything slightly complex can be tricky. Therefore, it is important to conduct a proper search to get the desired results. Searching by Region One of Google’s most important characteristics is its billions, if not trillions of indexed pages. Therefore, if a Read More

Share on:

Space Mining

Last edited by . Total of no comments in the discussion.

Space mining refers to the planned extraction of mineral content from asteroids, comets, planets, and other heavenly bodies. Astronomers and scientists confirm that a single asteroid could actually hold large amounts of metals and minerals that could amount to billions of dollars in total monetary value. This claimed fact has sparked lots of interest among scientists and businessmen alike. If asteroids hold such large deposits of valuable minerals, investing on mining these minerals from the asteroids could prove to be very profitable. While asteroids could vary in size, it is Read More

Share on:

Cisco Network Management

Last edited by . Total of 1 comment in the discussion.

Cisco Network Management Overview of Network Management Different people may take network management as different meanings. It may be considered as solitary network consultant for monitoring network activity using outdated protocol analyzer. While network management in distributed database environment, managing network nodes for generating real time graphics and auto polling of network devices. There are number of tools and applications which are used for network management to support network administrators to monitor and maintain networks of all types. In the early 1980s remarkable growth in field of network deployment was Read More

Share on:

Two Factor Authentication

Last edited by . Total of no comments in the discussion.

Two factor authentication is term used to describe any authentication mechanism where more than one thing is required to authentate a user. The two components of two factor authentication are: Something you know Something you have Traditional authentication schemes used username and password pairs to authenticate users. This provides minimal security, because many user passwords are very easy to guess. In two factor authentication, the password still provides the something you know component. In the most common implementations of two factor authentication, the something you have component is provided by Read More

Share on: