An attic antenna is one that is mounted inside of an attic in order to provide maximum range as well as protection from rain, snow, sun, wind, and animals. Attic antennas are rather common and provide quality reception for those who live in rural areas, away from most radio transmitters. While attic antennas do not have as good a reception as outdoor antennas, they are covered and do not detract from the home’s appearance. How Attic Antennas Work Except that they are mounted indoors, attic antennas use the same principles Read More
How to Delegate Administrator Privileges in Active Directory
The primary reason to create organizational units is to distribute administrative tasks across the organization by delegating administrative control to other administrators. Delegation is especially important when a decentralized administrative model is developed. Delegation of administration is the process of decentralizing the responsibility for managing organizational units from a central administrator to other administrators. The ability to establish access to individual organizational units is an important security feature in Active Directory. Users can control access to the lowest level of an organization without having to create many active directory domains. Read More
TCP Sequence Prediction Attack
A TCP sequence prediction attack is an attempt to hijack an existing TCP session by injecting packets which pretend to come from one computer involved in the TCP session. The TCP Sequence Prediction Attack TCP is a reliable connection-oriented layer 4 (Transport Layer) protocol. Packet transfer between hosts is accomplished by the layers below layer 4 and TCP takes responsibility to making certain the packets are delivered to higher layers in the protocol stack in the correct order. To accomplish this reordering task, TCP uses the sequence number field. To Read More
How Do I Find Out Who Owns an Email Address?
Finding someone’s email address can be quite difficult, but finding out who owns a specific email address is rather easy. While email and the Internet has provided millions of people a way to stay connected to each other, it also means that each person on the Internet leaves a footprint behind that shows who they are, what they have been doing, and what they are interested in. This article will go over a number of ways in which anyone can be tracked down by using their email address. Forums An Read More
Nanotechnology
The word nanotechnology is a combination of the two terms "nano" and "technology." From this alone, it is apparent that nanotechnology is an application of scientific concepts at the level of molecules and particles, the sizes of which fall within the range of 1 to 100 nanometers. In a nutshell, nanotechnology refers to functional engineering at the level of molecules. Specifically, it is the deliberate application of production processes and technology at the molecular level in the order to achieve a desired result, to manufacture materials and consumables with unique Read More
Rhino Tutorials
Rhino Tutorials Welcome to ByteGuide’s Rhino Tutorials section. Here you will find guides on how boolean expressions in Rhino, new Plug-in commands, how to setup Rhino, Modeling Vegetation – Rhinoceros 3D 1.0, aircraft modeling in Rhino 3D, secrets of Rhinoceros, hidden Secrets, tutorial on backgrounds, SolidsModelling.com, how to edit Polysurfaces, how to importing PDFs and Bitmaps. Info: Defining New Plug-in Commands This tutorial offers information on deriving new command classes in Rhino. It also includes step-by-step instructions on how to use the Rhino Command Generator. Rhino SetUp This tutorial provides Read More
Jar File
JAR is an abbreviation for Java Archive. It is basically a file in archive format used to group and integrate Java classes, resources, metadata together which can then be easily distributed across Java platform. However the underlying file format is ZIP with a .jar extension. Every JAR file contains a manifest file which is normally the first in the JAR header. The Java Development Kit (JDK) bundles an built-in tool to create and extract JAR files. Like any archive format, JAR also helps compress data that’s packed into it. The Read More
Long Range Acoustic Device
The LRAD or the long range acoustic device that has been developed by American Technology Corporation is capable of emitting a maximum of 151Db sound within 30 degrees of where the device is pointing. This device can be used as a combatant deterrent weapon or crowd-control device by emitting sounds that are painful to the ears. The LRAD weighs about 210 kilograms and is capable of emitting sound within a 15 to 30 degree beam. The range of the LRAD is 300 to 500 meters and, at maximum volume, it Read More
Address Bus
The address bus is the set of wire traces that is used to identify which address in memory the CPU is accessing. The number of wire traces in the address bus limits the maximum amount of RAM which the CPU can address. CPU Address Bus Sizes CPU Address Bus Size 8086 20 bit 8088 20 bit 80286 24 bit 80386SX 24 bit 80386DX 32 bit 80486SX 32 bit 80486DX 32 bit Pentium I 32 bit K6 32 bit Duron 32 bit Athlon 32 bit Athlon XP 32 bit Celeron 36 Read More
IS-95: CDMA
IS-95 is a standard for CDMA (Code Division Multiple Access) Digital Cellular. Mobile Frequency Range Rx: 869-894; Tx: 824-849 Multiple Access Method CDMA/FDM Duplex Method FDD Number of Channels 20 (798 users per channel) Channel Spacing 1250kHz Modulation QPSK/OQPSK Channel Bit Rate 1.2288Mb How CDMA Works In a CDMA system, your encoded voice is digitized and divided into packets. These packets are tagged with "codes." The packets then mix with all of the other packets of traffic in the local CDMA network as they are routed towards their destination. The Read More
Share on: