Advert

How to Unzip Files

Last edited by . Total of no comments in the discussion.

ZIP is a standard file format used for compression and archival of data files. When a file is “zipped” it will normally save a significant amount of file storage space if the files that are zipped are based on text data. Pictures and other multimedia files will not normally compress significantly when zipped if they are a format that already incorporates compression technology such as JPEG ,GIF, and BMPs (bitmaps). Advantages of zipping files include saving storage space on the local hard drive, creating the ability to send smaller attachments Read More

Share on:

Antimatter

Last edited by . Total of no comments in the discussion.

As matter is composed of many particles such as electrons and protons, antimatter is composed of antielectrons (also called positrons) and antiprotons. The antimatter concept also tells us that all matter has corresponding and equivalent antimatter that possess opposite properties. For instance the hydrogen atom will have corresponding antimatter called antihydrogen and all of the antihydrogen's particles will have properties opposite those of the normal hydrogen particles. A hydrogen atom's proton has a positive charge while the antiproton of the antihydrogen will have a negative charge. However, the antihydrogen's antiproton Read More

Share on:

RSN (Robust Secure Network)

Last edited by . Total of 1 comment in the discussion.

RSN (Robust Secure Network) is a protocol for establishing secure communications over an 802.11 wireless network. RSN (Robust Secure Network) is part of the 802.11i standard. The RSN Protocol Process The RSN protocol functions as follows: The wireless NIC sends a Probe Request. The wireless access point sends a Probe Response with an RSN Information Exchange (IE) frame. The wireless NIC requests authentication via one of the approved methods. The wireless access point provides authentication for the wireless NIC. The wireless NIC sends an Association Request with an RSN Information Read More

Share on:

How a Wireless Mouse Works

Last edited by . Total of 20 comments in the discussion.

The mouse is an extremely popular device. While the majority of mice are connected directly to the computers peripheral input via a cord and the computer’s main power powers it, wireless mice are becoming extremely popular as they give computer users cordless accessibility to their mice and their computer. Wireless Mouse Technology Wireless mice usually work via radio frequencies commonly referred to as RF. RF wireless mice require two components to work properly – a radio transmitter and a radio receiver. RF Transmitter A radio frequency (RF) transmitter is usually Read More

Share on:

Red Box

Last edited by . Total of no comments in the discussion.

When a coin is inserted into a payphone, the payphone emits a set of tones to ACTS (Automated Coin Toll System). Red boxes work by fooling ACTS into believing you have actually put money into the phone. The red box simply plays the ACTS tones into the telephone microphone. ACTS hears those tones, and allows you to place your call. The actual tones are: Nickel: 35-160ms 1700hz & 2200hz tone burst, followed by 240ms of silence. Dime: Two 35-160ms 1700hz & 2200hz bursts, with a spacing of 20-110ms between the Read More

Share on:

Motes

Last edited by . Total of 2 comments in the discussion.

Motes are also sometimes referred to as smart dust. One mote is composed of a small, low powered and cheap computer connected to several sensors and a radio transmitter capable of forming adhoc networks. The computer monitors the different sensors in a mote. These sensors can measure light, acceleration, position, stress, pressure, humidity, sound, and vibration among others. Data gathered are passed on to the radio link for transmission from mote to mote until data reaches the transmission node. These radio links between motes have a transmission distance of 10-200 Read More

Share on:

How to Stream Audio

Last edited by . Total of no comments in the discussion.

Streaming audio involves transmitting music files over the Internet in real-time and playing it on a client-side computer as it arrives. Streaming is different than podcasts because it allows for continuous, live music rather than scheduled uploads. Streaming is often used for music, talk radio, and live web events by radio hosts, politicians, and even average people. Streaming audio can be entertaining, useful, and fun but to do it, the user needs a service that allows them to stream audio to the Internet. Several of these services are listed below. Read More

Share on:

Managing the IIS Metabase

Last edited by . Total of no comments in the discussion.

An Overview of the IIS Metabase With the introduction of IIS 4, came the introduction of the metabase. IIS configuration information was no longer stored in the Registry, but in the new metabase structure. Some IIS configuration settings however still remained stored in the Registry, under the following keys: HKLMSOFTWAREMicrosoftInetMgrParameters HKLMSYSTEMCurrentControlSetServicesInetInfoParameters HKLMSYSTEMCurrentControlSetServicesASPParameters HKLMSYSTEMCurrentControlSetServicesHttpParametersLogBufferSize HKLMSYSTEMCurrentControlSetServicesW3SVCParameters HKLMSYSTEMCurrentControlSetServicesMSFTPSVCParameters In IIS 4, separating the majority of IIS configuration settings into the metabase; speeded up access to the information. The issue with the metabase in IIS 4 and IIS 5 was that it was a Read More

Share on:

What is Bluejacking?

Last edited by . Total of 3 comments in the discussion.

Bluejacking is a relatively new term that describes the act of sending an anonymous message to other Bluetooth equipped devices such as mobile phones, laptops, printers, cars, and Personal Data Assistants (PDAs). To date, mobile users have primarily Bluejacked others in their general proximity for friendly purposes. Bluejacking is possible because Bluetooth technology is open to receiving communications within the device’s effective range in the 2.4 GHz frequency band. How does Bluejacking Work? If a device is Bluetooth enabled, it can send or receive Bluejacking messages. The message is sent Read More

Share on:

ReadyBoost

Last edited by . Total of no comments in the discussion.

Ready Boost is an operating system feature introduced with Microsoft's Windows Vista operating system. The best way to improve the functioning of a PC is to increase its memory as increased memory enables more applications to operate on the computer. But this is not possible in many PCs as they have a maximum limit of memory and to increase it will call for upgrading memory which is very costly and some machines have limited expansion capabilities which don't enable the expansion. It is here that the Windows Vista comes to Read More

Share on: