Web hosting works by taking a website and connecting it to the Internet. Because the Internet is a collection of millions of computers all connected together, a web host has a series of servers that are connected to high speed Internet lines that allow data packets to be sent to and from the individual websites on the server. Web hosting works by handling a multitude of different websites on the World Wide Web. A web host works by serving the web page that is requested by a browser. For example, Read More
RG-11
Coaxial cables are necessary for rooftop antennas and dish antennas in order to provide crystal-clear sound and audio input. RG-11 bands typically have 75-ohm wires made of copper. Polyethylene dielectric makes sure that there is minimal loss of picture and sound while the antenna receives audio or video feeds. Most users of the RG-11 have reported high-quality resolution of the images transferred by these cables. RG-11 Specifications Type RG-11 RG-11A Impedance Z0(Ω) 75 75 Dielectric Solid Polyethylene Solid Polyethylene Time Delay (ns/ft) 1.54 1.54 Propagation Velocity (% of c) 65.9 Read More
Kinetoscope
A Kinetoscope is a device that shows older films or motion pictures through a viewing window. The device predates the movie projector and housing the viewing window in a cabinet. The kinetoscope’s basic concept served as the basis for movie projectors that were developed later. The kinetoscope produces the illusion of movement or animation by using perforated film strips that have sequential images that comprise the movie or film frames that are moved over a light source with a high-speed shutter. Who Invented the Kinetoscope? Thomas Edison was originally credited Read More
How to Post a Video on Facebook
Different media types can be displayed on a Facebook account through one’s profile page wall and status updates that are posted in one’s news feed. One of the most attractive media types that one can provide is video. Videos on Facebook add the elements of motion picture and sound rather than just a series of photos on the page. Posting a video on Facebook is possible through a variety of methods. Each method has its advantages and disadvantages. Record a Video Facebook is equipped with the ability to capture Read More
568B
EIA/TIA 568B is a standard for the pin arrangements of RJ-45 connectors on Unshielded Twisted Pair (UTP) wire. The 568B standard was developed by AT&T under the name 258A. 568B Color Codes Pin (Jack) Pin (Plug) Color Pair 1 8 White/Orange 2 – Tip 2 7 Orange 2 – Ring 3 6 White/Green 3 – Tip 4 5 Blue 1 – Ring 5 4 White/Blue 1 – Tip 6 3 Green 3 – Ring 7 2 White Brown 4 – Tip 8 1 Brown 4 – Ring Pin numbers are Read More
DVD Mastering
DVD Mastering is a digital optimization procedure that eventually readies a DVD project for duplication or reproduction. DV mastering is done for both audio and audiovisual projects, and with the right knowledge and software, can be done by just about anyone. DVD mastering procedures generally vary with the type of services sought and the form of source materials provided. For audio, the customer usually submits the DVD mastering service with a mix down of the finished product in two-channel digital and analog tracks. The mastering service in turn runs these Read More
Proxy Arp
ARP (Address Resolution Protocol) is used by network systems to convert system communications from the routable layer 3 ip protocol to the non-routable layer 2 data link layer protocols. In most cases, you don't need to modify this behavior at all, and system communications are optimal. In special circumstances it is preferable to have another system or network device answer arp requests for another system. This process is called proxy arp, because on network system is proxying for anothers ARP communications. Environments that use proxy arp There are few situations Read More
What is Spear Phishing?
Email phishing scams have been around just about as long as email itself. The term email phishing refers to the act of maliciously sending a fake or fraudulent email in order to trick the receiver into visiting a malicious website, downloading a malware infected email attachment, or purposely giving up vital pieces of private information. The next generation of phishing attacks is referred to as spear phishing. This attack is similar to traditional phishing, except that the phishing email is only sent to people in a small, related group such Read More
What is Fair Use?
Fair use is a principle present in US copyright law that pertains to the usage of copyrighted material in a limited manner, without prior consent from the copyright holders. Fair use of copyrighted material refers to the limited usage of such material for the purpose of criticism, commentary, teaching, research and news reporting. Fair use and its related guidelines were clearly defined in 1976 under section 17 of the United States Copyright act. As per section 17 of the United States Copyright act, fair use is considered valid if the Read More
USB to Ethernet Adapter
USB (Universal Serial Bus) is a hardware specification that allows a connection to be established between a source device and a peripheral device. Most modern electronic devices include at least one built-in USB port and can use USB technology to connect to other devices, such as keyboards, mice, cameras, flash drives, external hard drives, printers, media players, wireless network adapters, game consoles, and cell phones. USB technology allows devices to share data and is widely used to transfer files to an external storage device. Additionally, USB technology can supply power Read More
Share on: