In many situations, it is extremely important to know the Windows software version that one’s computer is running. While it is obvious whether a computer user is running Windows 98 compared to Windows XP from the welcome screen, knowing the version and other information about the operating system can help a user avoid problems loading software that is compatible with the current version installed. For instance, with Windows XP, Microsoft has produced several versions – each sometimes requiring a specific driver for hardware and software devices. In order to ensure Read More
Phone Phreaking
Phone phreaking is the act of gaining illegal access to resources of telecom networks for fun or malicious activity. Before computer hacking took over, phreaking was the dominant underground tech activity. Some phone phreakers just wanted to understand how telecom infrastructure worked. Others wanted to make free long distance phone calls. As voice and data networks continue to merge, phone phreaking represents a much more dangerous threat as phreakers can gain back door access to corporate networks through unsecured modems and steal data, launch attacks and generally wreak havoc on Read More
Apogee
Apogee is a term used to describe the point at which a satellite or object in orbit is at its furthest distance away from the Earth. When an object is at its apogee, it travels much slower than at any other point in its orbit because the Earth has less of a pull on it. By knowing an object’s apogee, scientists can calculate the total distance the object will travel around the Earth and whether it is getting closer or further away from the Earth upon each orbit. How Apogee Read More
Deleting an Element from a Linear Linked List
To delete an element from the list, first the pointers are set properly and then the memory occupied by the node to be deleted is deallocated (freed). This tutorial covers the deletion of a node from the following three positions: At the beginning of the list At the end of the list After a given element Deleting from the Beginning of the List An element from the beginning of the list can be deleted by performing the following steps: Assign the value of head (address of the first element of Read More
How to Download Torrent Files
Torrent files are part of a P2P (peer to peer) trading system that make transferring files from one person to another on the Internet very easy, quick, and effective. It is important to note that torrent sharing is different from other types of P2P services, most notably Kazaa. For instance, with Kazaa, the user searches for other Kazaa users with the P2P application to see what files they are sharing. With torrent sites, the user goes to an index website that has torrent files (sometimes referred to as archives), which Read More
Troubleshooting Group Policy
Through Group Policy, a wide variety of user and computer configuration settings can be applied to users and computers in Active Directory. If an Active Directory environment includes a hierarchy with many different organizational unit (OU) levels, when group policies are applied at these different levels within the hierarchy, it is almost certain that Group Policy behavior and settings will have to be troubleshooted. There are going to be situations when Group Policy settings produce an expected result. Group Policy settings are contained in Group Policy Objects (GPOs), which are Read More
MagLev Train
Maglev (Magnetic Levitation) trains are the first practical use of Magnetic Levitation Technology in vehicles. In the present moment there are several countries working on the development of Magnetic Levitating trains: Japan and Germany were pioneers; USA and Australia are working in on it now. China, not being a pioneer, already has a magnetic levitating train from the airport of Shanghai to the city. Magnetic Levitation and Propulsion: The trains are floating in a magnetic cushion about 3/8″ (1 cm) above its tracks. The propulsion is done by differential shifts Read More
Computer Telephony Integration (CTI)
Computer Telephony Integration is a set of technologies for integrating and managing computers and telephone systems. CTI functionality falls into two general categories: CTI enables the computer user to control their telephone system CTI enables the telephone system to display information via the computer A user with a CTI-enabled computer will be able to dial the telephone, answer the telephone, and hang-up the telephone, all from their computers. Call Telephony Integration enables users to dial the phone from address books stored on their computer. Most CTI systems also enable the Read More
BNC Connector
More properly known as the Bayonet Neill-Concelman connector, the BNC connector is one of several radio frequency connectors on the market today. The name of the connector is derived from a combination of two things: 1) the connecting technology employed; and 2) the names of the two inventors of the device. Paul Neill of Bell Labs and Carl Concelman sought to develop a connector that would employ a bayonet mount mechanism for locking. Building on the research of Octavio M. Salati, the two men perfected an earlier design and created Read More
Linear Regression
Linear regression is a method used in statistics to model relationships between a single, scalar variable and one or more other variables. In the linear regression method, a model is estimated for the unknown parameters from the existing data using linear functions. These models are referred to as “linear models.” Linear regression can also refer to a model in which some median of the conditional distribution of a variable, given a condition, is expressed as a linear function. Similar to other forms of regression, the linear regression application focuses on Read More
Share on: