The procedure for adding a new user to Windows depends on the Microsoft Windows version. In addition, there are several ways to add new users to most Windows versions. The instructions presented here show only a few of the possible paths to creating new users on Windows. Add a User to Windows XP Click the Start button Click the Control Panel menu item Double-click the User Accounts icon Click the Create a new account menu item Type a name for the new account in the data entry box Click the Read More
WEP (Wired Equivalent Privacy)
Wired Equivalent Privacy (WEP) is the encryption algorithm built into the 802.11 (Wi-Fi) standard. WEP encryption uses the RC4 stream cipher with 40 or 104 bit keys and a 24 bit initialization vector. WEP Key Generation Most 802.11 devices allow WEP keys to be entered using an ASCII passphrase or in hexidecimal format. The conversion between these two formats is an industry standard which is shared by almost all vendors of 802.11 equipment. Some 802.11 devices have difficulty using ASCII passphrases or use a non-standard conversion algorithm. For those devices, Read More
Defining a Baseline Security Template
Security Templates Review A security template is collection of security configuration settings that can be applied to a domain controller, member server or a workstation. The settings within a security template control the security configuration of a computer through both local policies and group policies. A security template can be applied to a local computer, or incorporated into a Group Policy object in Active Directory. You can manage one computer or multiple computers through the security settings contained within a security template. For computers that do not belong to an Read More
TEMPEST
TEMPEST stands for Transient Electromagnetic Pulse Surveillance Technology. Computers and other electronic equipment release interference to their surrounding environment. You may observe this by placing two video monitors close together. The pictures will behave erratically until you space them apart. What is important for an observer is the emission of digital pulses (zeroes and ones) as these are used in computers and data communications. The channel for this radiation is in two arrangements, radiated emissions and conducted emissions. Radiated emissions are assembled when components in electrical devices form to act Read More
How MIDI Works
MIDI, or Musical Instrument Digital Interface, was introduced to the technological industry in 1983. It is defined as an industry-standard protocol that allows electronic musical instruments, computers and other electronic equipment to communicate, control and synchronize with each other. It was designed by Dave Smith of Sequential Circuits, Inc to allow the keyboard of one synthesizer to play notes generated by another. MIDI enables computers, synthesizers, MIDI controllers, sound cards, samplers and drum machines to control one another and exchange system data. Since MIDI does not send sound waves, like Read More
802.16
Heard about WiMax or WirelessMAN? What about 802.16? For people new to these techie concepts, it is worth knowing that among the newest innovations that science and technology of today provides, the 802.16 is the one considered by most experts as a powerful technological tool. It is created as a set of standards designed to enhance the performance of wireless networking. Simply put, the 802.16 is made to provide the so-called "last mile" of Internet access' pace to its end users. The WiMax or 802.16 is deemed as one powerful Read More
How Do You Copy Files to a USB Flash Drive?
A USB flash drive is a small, external hard drive that can hold files, pictures and music depending on the size of the flash drive. It is called a flash drive because it is made up of flash memory which can easily be erased and reprogrammed. In other words, with a few clicks and drags, a flash drive can go from being completely full to completely empty and capable of carrying more information. Flash drives used to be expensive when they first came out, but it has become cheaper to Read More
How to Block a Phone Number
With the increase in global communications, the need for phone users to block a phone call has increased. The reasons for blocking a phone call vary. There are a number of easy ways to block incoming calls. What Types of Phone Calls Do People Block? It really depends on the person. The reasons for blocking phone calls can range from keeping known telemarketers from calling your home to keeping ex-spouses or significant others from harassing you or your new spouse. Although the National Do Not Call Registry (NDNCR) has been Read More
How Do I Make Index Cards in Microsoft Word?
One of the better functions of Microsoft Word is the ability to change the layout of the page so that you can create different sized documents. Making index cards in Microsoft Word is very easy and, if your printer is good, they will print and read very good. It is important, though, to get blank index cards because getting the words to match up with the lines on the index cards is nearly impossible and will result in a waste of cards. Determine the size of the index cards you'll Read More
Click Fraud
Click fraud is a internet crime targeting pay-per-click advertising systems. Click fraud occurs when a person or a group of persons, computer software or a internet bot clicks on an ad for the sole purpose of generating income for the publisher or putting a competitor out of business and not because of any real interest in the products advertised. Click fraud is considered a felony in many places such as California and the United Kingdom. Pay-per-Click Advertising and Click Fraud PPC advertising is a contract between two parties – usually Read More
Share on: