iTax iTax is a free/open source multi-platform implementation and extension of the Australian Tax Offices(ATO) 'e-tax' software. phase 1 of this to create a free/open source multi-platform implementation of the ATOs e-tax phase 2 is to extend e-tax. MoneyJar MoneyJar is a Java library to help with implementations for demanding financial applications. This library simplifies money management, rounding, currency conversion, tax calculation (tax-on-tax, multiple tax) and invoice management. Highly configurable. PalmOS Philippine Income Tax Calculator A PalmOS application that calculates the monthly and yearly income tax incurred by employees according Read More
How to Clean a DVD Player
DVD players, while extremely affordable and for the most part reliable, do become dirty. In almost any environment, dust, pollen, hair and other contaminants can penetrate the DVD machine which can impact the playing of digital media. The good news is that with just a few household tools and occasional maintenance, you can keep your DVD clean and running smoothly. Tools Needed to Clean the Exterior of your DVD Player Most parts of the exterior of the player can be cleaned with simple household products such as: Rubbing alcohol or Read More
MSOCACHE
MSOCACHE (Local Install Source) is a setup feature that Microsoft deploys with Microsoft Office 2003. It is a hidden folder that is installed on the target computer’s local hard drive. It can occupy up to 290 Megabytes (MB) of space depending on the Microsoft Office programs that are installed on the computer. This feature eliminates the need to insert the Microsoft Office installation CD to later install components that were not included in the initial configuration options. What Does MSOCACHE Do? MSOCACHE is not just for making it easier for Read More
What Are Social Networking Sites?
There are dozens of different social network sites on the Internet. Each one provides a different experience for the user and has a different purpose. A social network is a way for people to network with different people on the Internet. By creating a profile, a user can connect with people that might have a common interest or a common career. It makes communication between people so much easier. While there are so many, the three top ones that show the most promise are Facebook, Twitter and LinkedIn. Facebook Facebook Read More
USB Software
USB software refers to software that can be readily accessible from a USB flash drive or can be run from the USB flash drive without installing the software on the host computer. USB software can include a wide variety of programs that perform many different tasks. For example, WinAudit is capable of analyzing a host computer and providing stastistics. Disk Digger, on the other hand, is capable of restoring deleted files and recovering lost information. This article will go over both of these programs and many more in order to Read More
Null Route
A null route is a route that goes to nowhere. The reason for creating a null route is to prevent your system from sending any data to a remote system. Creating a null route Null routes are usually created using the `route` command. This works under both Windows and Unix, although the syntax differs. The example shows the creation of a null route for an entire Class C network: # route add 193.252.19.0 0.0.0.0 add net 193.252.19.0: gateway 0.0.0.0 We can see the route which this command created using the Read More
What is an Anechoic Chamber?
An anechoic chamber prevents sound, radio signals, and electromagnetic waves from echoing in a room. Anechoic chambers often test antennas, measure the direction of sound, or record music. Anechoic chambers are found all over the world, especially in universities, and can be as large as an aircraft or as small as a car. Full-anechoic chambers that are measured at less than 0 DBA are completely silent as they absorb more sound than humans can hear. In fact, an anechoic chamber at the University of Salford in Greater Manchester, England is Read More
AAA (Authentication, Authorization, and Accounting)
AAA (Authentication, Authorization, and Accounting) is a model for access control. Authentication Authentication is proving who you are. Authentication answers the question Who is this person? Authentication is the first component of the AAA (Authentication, Authorization, and Accounting) model for access control. Authentication must precede Authorization, because you must prove who you are before the identity management system can determine what you are authorized to do. Authentication is traditionally accomplished using passwords. More secure authentication technologies include two factor authentication and biometrics. Authorization Authorization is defining what you are allowed Read More
NTFS Permissions after Copying or Moving Files
When copying or moving a file or folder, the permissions may change depending on where you move the file or folder. Copying Files and Folders When copying folder or files from one folder to another folder or from one partition to another partition, permissions for this files or folders may change. When copying a folder or file within same NTFS partition, the copy of the folder or file inherits the destination folder permissions. When copying a folder or file between different NTFS partitions, the copy of the folder or file Read More
Satellite Launch Sites
Satellite launch sites are facilities on the Earth that are designed to receive and launch satellites that may orbit the Earth or travel to other planets or even star systems. Satellite launch sites are often referred to as “spaceports” or “cosmodromes” and may be situated on ground or in any ocean. While satellites are often launched from facilities that are designed to launch space shuttles and/or rockets, some facilities are entirely dedicated to launching satellites. Although many different companies and organizations own satellites, these companies are not allowed to launch Read More
Share on: