Advert

How to Recover a Lost Windows Password

Last edited by . Total of 9 comments in the discussion.

There are several ways to recover a lost windows password. Hidden administrator account method, Windows installation disk, and third party software are some of the methods you can try. Hidden Administrator Account Method If using a custom user account, Windows automatically creates an “Administrator” account that is hidden from the user selection log in screen. There are two options for logging into an administrator account: The first option is to start up the machine in the welcome or log in screen and pull up the classic log in screen. Press Read More

Share on:

How to Setup a PC Microphone

Last edited by . Total of no comments in the discussion.

With the increased use of applications featuring live video chat options such as Google Talk, Skype, and Yahoo IM, setting up a PC microphone is now an essential task to ensure the highest quality of service while using these and other related products. Although most versions of the Windows OS are designed to automatically detect and auto-configure a microphone, to ensure optimum performance the device must be configured to minimize the effects of background noise on the quality of sound transmission. How to Set Up a PC Microphone Step 1 Read More

Share on:

How to Improve Internet Speed

Last edited by . Total of 1 comment in the discussion.

LAN vs WLAN Internet speed depends greatly on the type of network the computer is connected to. There are two basic types of networks that allow Internet connection. A LAN (Local Area Network) is a network that is established via an Ethernet cable and physically connects a computer to a router, modem, or access point. LANs provide much faster Internet speed, but limits the distance between a computer and the access point it is connected to. As a result, many switch to WLANs (Wireless Local Area Networks). A WLAN is Read More

Share on:

How to Remove a Browser Hijacker

Last edited by . Total of no comments in the discussion.

Browser hijackers are malicious programs that redirect computer users to websites that the hacker wants and deploy the computer malware. The hijacker may change a computer’s default homepage or redirect computer users trying to visit legitimate websites such as their bank or Google to a maliciously crafted copy of the site to deploy computer malware to the computer or steal the user’s data. Most browser hijacks are based on adware, and to a more limited degree, spyware functions. How do Browser Hijackers Infect Computers? When a computer browser is hijacked, Read More

Share on:

Solder

Last edited by . Total of no comments in the discussion.

Solder is a metal with a low melting point that is used to create the conductive joints between components and tracks in electrical circuits. There are many types of solder used for different metals, but the most common solder used for electronics is an alloy of tin and lead. Solder Flux Flux is essential for making good solder joints. It removes the thin film of surface oxidation that prevents two metals sticking together. It also prevents more oxidation occurring during soldering. Heat causes the flux to change it's chemical structure Read More

Share on:

How to Install Active-X

Last edited by . Total of 5 comments in the discussion.

ActiveX is designed to be a framework to allow software components to be reused independent of the programming language used in development. One or more of these components can be used for development of software applications and digitally signed to validate the identity of the author of the component. First developed in the mid-1990’s by the Microsoft Corporation, ActiveX controls are used by Windows Media Player, Microsoft Office, Internet Explorer, and Microsoft Visual Studio and can be embedded into web pages for added functionality. A common task that arises for Read More

Share on:

How to Audit Windows NT/2000/XP Passwords

Last edited by . Total of no comments in the discussion.

Microsoft Windows NT/2000/XP passwords are encrypted as 32-bit one-way hashes using the MD4 messages digest algorithm. This is similar to the way that Unix stores passwords, although the hashing algorithm is different. For compatibility with legacy Microsoft LAN Manager software, Windows NT/2000/XP also stores the passwords redundantly as a 56-bit DES (Data Encryption Standard) hash. This 56-bit hash is created by splitting the password into two 7-character uppercase strings, and then converting each to a 56-bit DES key which both then encrypt the string “KGS!@#$%” and concatenating the results. This Read More

Share on:

Rheometer

Last edited by . Total of no comments in the discussion.

A rheometer is a device that was developed to measure how a liquid’s suspensions or slurries flow when force is applied to it. Many fluids can be tested with a rheometer when a single numerical viscosity value cannot determine them due to their components. A rheometer can also be used to discover the additional parameters and values that a viscometer can correctly measure. In other words, the rheometer tests a fluid’s rheology. There are two types of rheometers that test a liquid’s rheology. There is an applied shear stress/strain option Read More

Share on:

Trunking

Last edited by . Total of no comments in the discussion.

Traditional radio equipment works because all parties involved in the communication agree on what frequencies they will utilize. Traditional radio scanners work by scanning for and then listening to those frequencies. Trunking radios, on the other hand, constantly renegotiate the frequencies utilized for the conversation. This allows for more efficient utilization of limited frequencies because each conversation does not require a dedicated channel. However, it also makes it very difficult to scan trunked conversations because you do not usually know what frequency the next portion of the conversation will appear Read More

Share on:

How Does a Processor Work?

Last edited by . Total of no comments in the discussion.

A computer processor is commonly referred to as the CPU, or central processing unit of a computer. The processor is the primary component of a computer designed to move and process data. Computer processors are commonly referred to by the speed that the CPU can process computer instructions per second measured in hertz and are one of the primary selling points of a computer. How Does the Processor Work? The computer processor acts as the primary coordinating component of the computer. The CPU will access programs, data, or other computer Read More

Share on: