Advert

What’s New in IIS 6.0

Last edited by . Total of no comments in the discussion.

An Overview of Internet Information Services (IIS) Internet Information Services (IIS) is one of the more commonly used Web servers utilized on the Internet and in intranets. Through IIS, you can create and manage Web sites, and share and distribute information over the Internet or intranet. With the introduction of the Windows 2000 Server OS came the launch of Internet Information Services (IIS) 5. IIS 5 included the name change from Internet Information Server to Internet Information Services. IIS 5 was integrated with the Active Directory directory service introduced in Read More

Share on:

How to Convert RM to DVD

Last edited by . Total of no comments in the discussion.

RM or RealMedia is a multimedia format container designed by Real Media Player and is primarily used as a streaming format by consumers. Unfortunately, the RM format is not supported across all software or hardware platforms and requires conversion. A common task that arises for end users is to convert RM to DVD format. Steps to Convert RM to DVD Using Easy RM RMVB to DVD Burner The Easy RM RMVB to DVD burner is a DVD authoring and burning software application that supports RM to DVD conversion and can Read More

Share on:

AMPS (EIA/TIA-553) and NAMPS (IS-91)

Last edited by . Total of no comments in the discussion.

Mobile Frequency Range Rx: 869-894; Tx 824-849 Multiple Access Method FDM Duplex Method FDD Number of Channels 832 Channel Spacing 30kHz Modulation FM AMPS AMPS (Advanced Mobile Phone Service) was the first cellular mobile system in the United States. AMPS operates as an analog system using 30 kHz wide channels. NAMPS AMPS was later enhanced to NAMPS (Narrowband Advanced Mobile Phone Service), a version of AMPS that uses 10 kHz channels and by doing so triples cellular capacity. AMPS by Any Other Name Europeans often refer to AMPS as "American Read More

Share on:

CPU Usage

Last edited by . Total of 1 comment in the discussion.

CPU usage is defined as the time that a computer's main processing unit or CPU is devoted to executing a program or computer process's instructions. CPU usage is typically measured as a percentage of overall CPU processing capacity. A common problem that computer users face is figuring out how to deal with sources of problems that cause the CPU to approach or reach 100% usage. These problems differ from what normally causes a CPU to reach 100% usage (such as the System Idle Process). The System Idle Process is designed Read More

Share on:

DVD Capacity

Last edited by . Total of no comments in the discussion.

DVD-R DVD-R was one of the first DVD storage options and allows users to burn information to the disk one time. While users can often store up to 4.71 GB of information on a DVD-R disk, that information is permanently written to the disc and cannot be erased. More specifically, the disk cannot be used to store more information after the initial burning session. This means that even though there may be empty space on the disk, the disk becomes effectively useless. DVD-R disks are used mostly for installation disks, Read More

Share on:

Network Layer

Last edited by . Total of 3 comments in the discussion.

The Network Layer is located at the 3rd position in the seven layer OSI model. It offers serviceable and practical ways of transmitting variable length data series from a source to a destination through one or more networks, while preserving the class of service and error handling tasks. The Network Layer is accountable for source to destination packet deliverance and routing through intermediate networks. On the other hand, the Data Link Layer is in charge of node-to-node frame deliverance on a similar channel. The Network Layer executes network routing tasks Read More

Share on:

DSL Splitter

Last edited by . Total of no comments in the discussion.

A DSL splitter, like a DSL filter, is a device used to prevent interference problems. It filters the low frequencies of the telephone line from the high-frequency ADSL line. However, the installation of a DSL splitter requires the help of a technician to split the main telephone cable into 2 lines unlike a DSL filter which is easier to install. A DSL splitter is installed into one of the lines running to every jack in the house. After installing the splitter, a new phone point used solely for the ADSL Read More

Share on:

Waste Water Treatment

Last edited by . Total of 1 comment in the discussion.
Waste Water Treatment

Waste water can be treated in a variety of ways, depending on the facility’s abilities and the amount of waste that must be removed from it before it is released into the environment. Waste water generally passes through different treatment phases before it is released or reused. The process is carried out in a way that creates useful water options that can be recycled easier. The two main water options are gray water and black water. Gray water is derived from generally clean sources that do not contain human wastes Read More

Share on:

Ohm

Last edited by . Total of no comments in the discussion.

The ohm is the standard unit of resistance for direct current, and the standard unit of impedance for alternating current. According to Ohm's law, one ohm is the resistance between two points that requires one volt of potential difference to produce one ampere of current. In the process, one watt of energy is converted into heat. History of the Ohm The ohm was formally defined at an international conference in 1881, and is named after Georg Simon Ohm (1787 – 1854), a French physicist. The symbol is the Greek capital Read More

Share on:

Social Engineering

Last edited by . Total of no comments in the discussion.

Social engineering is a fancy name for manipulating a person into giving you access to which you are not normally entitled.    This almost always involves lying about your identity or your intent. Here is a transcript of a class social engineering trick used to convice a user to divulge his password: [user] Hello? [hacker] Hi, this is Bob from IT Security. We’ve had a security breach on the system and we need every user to verify their username and password. [user] What do I need to do? [hacker] Let’s walk Read More

Share on: