Note: This FAQ answer was written by someone else, but I do not know who. If you know who originally wrote this, please e-mail me. Applying these changes to the source code for your ircII client and recompiling gives you a new ircII command: /NEWUSER. This new command can be used as follows: /NEWUSER <new_username> [new_IRCNAME] <new_username> is a new username to use and is required [new_IRCNAME] is a new IRCNAME string to use and is optional This will disconnect you from your server and reconnect using the new information Read More
How to Install DirectX
To install DirectX, it is recommended that the latest DirectX version is downloaded directly from Microsoft. Go to the DirectX 9.0c End-User Runtime download page using Internet Explorer. Click the Download button. Click the Run button to run dxwebsetup.exe immediately. Click the next Run button. Check the circle next to “I accept the agreement.” Click the Next button. Click the Finish button. Checking the DirectX Version Installed on the System Users can check which version of DirectX is installed on their computer with the DirectX Diagnostic Tool. To check which Read More
Which is better, the underscore (_) or the hyphen (-)?
Google treats hyphens as spaces. Google does not treat underscores as spaces. Because of this, the string “search_engine” will not show up in a search for “search engine”, but the string “search-engine” will show up in that search. The end result is that hyphens are much better, from an SEO perspective, than underscores. This rule seems to hold true for use in text, in file names, and in domain names.
Convert WMA to MP3
Windows Media Player has significant market penetration throughout the world. When audio files are imported from CD or DVD, the software defaults to storing the music in the Windows Media Audio (WMA) format on the target computer. Unfortunately, the WMA format is not supported by all digital music players available on the market due to being a proprietary Microsoft format. To successfully play or import on alternative music players, end-users must convert WMA to MP3 format. How to Convert WMA to MP3 with Windows Media Player An inexpensive method to Read More
Pointers and Arrays
Arrays and pointers are very closely linked together. In most contexts, C++ treats the name of an array as if it were a pointer i.e. memory address of some element. C++ interprets an array name as the address of its first element. That is, if age is an int array to hold 10 integers then age stores the address of age[0], the first element of the array. Consider the following code snippet: int *a ; // a is a pointer to an integer int age[10] ; cout<<"Enter the value for Read More
Migrating from Exchange 2000 Server to Exchange Server 2003
Preparing for Migration to Exchange Server 2003 For number of services running in existing Exchange 2000 environments, you first have to move these services to other servers, and then remove the services so that the upgrade to Exchange Server 2003 can occur. The services listed here have to be removed before migrating to Exchange Server 2003: Instant Messaging Service (IMS) Key Management Service Microsoft Chat Service Microsoft Exchange Connector for Lotus cc:Mail Microsoft Mail Connector In addition to the removing the above mentioned services, the following requirements have to be Read More
Exchange Server 2003 Overview
Understanding the Different Messaging Systems With shared-file messaging systems, directories and files typically reside on a file server. The structure of directories and files at the centralized file server location are commonly called post offices. The post office is the mail store for many users. Users have to access a mail box in the post office in order to access email messaging. When a user sends a message, the message or written data is stored in the directories of the post office. The recipient of the message next identifies the Read More
How to Remove the Administrative Mode in Vista
The new MS Vista operating system is trying to be much tougher on viruses, trojan horses and other forms of malware. However, to implement this tough approach, Vista employs UAC (User Account Control) as the default setting. Vista UAC while is a great tool and resource for many to have on their computer, it does get on some peoples nerves. For experienced or power users, it can be down-right annoying, the reason being that any function that can limit security requires an administrator-level user level. Moreover, one must click through Read More
Understanding Internet Connections
Internet Connectivity Introduction In most organizations and networks today, Internet connectivity is no longer an additional option, but a necessity. Most organizations that have a networking environment need to provide its employees or users with some form of connectivity to the Internet. E-mail and Web sites have evolved into being important mechanisms for a vast number of organizations. Internet connectivity or connections support a company's business in a number of ways. Company employees use the Internet for a number of reasons, including the following: Exchange e-mail with other employees at Read More
Hall Effect
The Hall effect is the creation of a potential difference perpendicular to both the current flow in a conductor and the magnetic field which pass it. The Hall effect was discovered in 1879 by Edwin Hall, an American physicist. It has many applications such as measuring current and fluid flows. How the Hall Effect Works The charge carriers moving through the magnetic field are subjected to Lorentz force that deflect them away perpendicular to their normal path. This separation of charge carriers creates a potential difference between the opposite edges. Read More
Share on: