Advert

Radio Repeater

Last edited by . Total of 9 comments in the discussion.

Portable radios are limited in the power at which they can transmit, usually somewhere between .5 watts and 5 watts. A very rough rule of thumb is that one watt equals one mile of range over flat and open terrain. Buildings and mountains will, of course, greatly modify effective range. When two radios communicate directly with each other, this is known as Simplex. To achieve greater range, a radio repeater is often utilized. A radio repeater is a base station radio with a large antenna. Each portable radio communicates with Read More

Share on:

How to Remove the Concurrent Connections Limit in Windows XP

Last edited by . Total of no comments in the discussion.

Windows XP introduced the limiting of the number of possible TCP connection attempts to ten per second. This is likely to affect server and P2P programs that constantly need to open as many outbound connections as they can at the same time. The Limitations Many users believe that they should have the option to disable or change this setting, making this new implementation a cause for concern. If a P2P or some other network program tries to connect to fifty sites at once, the maximum it will be able to Read More

Share on:

MODx Parse Error

Last edited by . Total of no comments in the discussion.

MODx is a PHP driven content management system/framework (CMS/CMF) that is designed to help developers create and maintain sites without much programming. The CMF also includes an extendable applied programming interface to allow power users to extend the framework to fit individual or company needs. It does not have the steep learning curve that other CMSs on the Internet do. Many MODx CMSF users face the problem of getting the MODx parse error after performing a significant site upgrade/update or database modification. What is the MODx Parse Error? The MODx Read More

Share on:

Yahoo Web Messenger

Last edited by . Total of no comments in the discussion.

Yahoo Web Messenger is an instant messaging service, provided by Yahoo, which is integrated into Yahoo Mail and does not require users to download any software. Yahoo Web Messenger is the same software as the popular Yahoo Messenger, but is provided via the user’s browser instead of his/her desktop. Yahoo Web Messenger allows users to communicate with Yahoo, Facebook, and Windows Live contacts and requires users to run Internet Explorer 8 or later, Mozilla Firefox, Google Chrome, or Safari.   How Yahoo Web Messenger Works Yahoo Web Messenger is available Read More

Share on:

Configuring ISA Server Client Settings

Last edited by . Total of 1 comment in the discussion.

Configuring Web Browser Properties To configure Web browser properties, access the Web Browser Properties dialog box in the Client Configuration node of the ISA Server management console. The different settings that you can configure on the Web Browser Properties dialog box are explained here. On the General tab, you can configure the following settings: Configure Web Browser During Firewall Client Setup checkbox; select this option if you want the Firewall client software to configure the Web browser of the client. If not, clear the checkbox for the setting. DNS Name Read More

Share on:

OneNote for Mac

Last edited by . Total of no comments in the discussion.

Microsoft OneNote is a program that allows users to keep track of all of their notes as the notes are kept in one place. Microsoft OneNote allows the user to plan vacations, write in his/her blog, keep day-to-day notes, create shopping lists, do research, and conduct a variety of other note related tasks. Microsoft OneNote is included in Microsoft Office, but cannot be purchased separately or downloaded for free although a free trial exists on its main page.   OneNote For Mac OneNote is currently available for Windows, Windows Phone Read More

Share on:

How to Add Exponents

Last edited by . Total of no comments in the discussion.

Adding exponents is one of the three basic rules when dealing with the combination of two bases and powers. The general rule for it is as followed: when you want to multiply the powers with the same base, simply add the two exponents together. In other words, if the bases are the same number, to multiply the two together, simply add the two exponents together to gain the right answer. Before that can be done, though, it is important to understand what a base and exponent are. What are Bases Read More

Share on:

Free Firewall Software

Last edited by . Total of 1 comment in the discussion.

Free firewalls have become very common and represent an excellent alternative to commercial firewall packages. Most of these firewalls run under some form of Linux, FreeBSD, or OpenBSD. Many of these free firewalls are front-ends for the lower-level firewall packages which ship with these operating systems, such as pf (Packet Filter), ipf (IPFilter), ipfw (IPFirewall), and iptables. Free firewall packages which you can download include: Firestarter Firesarter is a free firewall tool for Linux machines. Whether you simply want to protect your personal workstation or you have a network of Read More

Share on:

Data Mart

Last edited by . Total of no comments in the discussion.

Most people are familiar with terms like data warehousing, data mining, and data cleansing, but fewer people are familiar with data mart. A data mart is a subsection of a data warehouse that deals with specific information. Much like the chapters of a book, a data mart contains related information that deals with the same subject, but may also be divided into its own categories. In this article, we will be exploring data marts and data mart software that allow you to extract information from a data warehouse and analyze Read More

Share on:

How to Use Recovery Console

Last edited by . Total of no comments in the discussion.

What is The Recovery Console? The Recovery Console is a command-line prompt that is available in most versions of the Windows Operating System. It allows users to repair/replace broken, corrupted, or missing system files. These files are crucial to Windows' normal functionality and performance and the entire operating system can stop working if these files are damaged. In fact, Windows may not startup at all when these files are missing and requires the user to open the Recovery Console from the Installation CD or boot menu. The Recovery Console can Read More

Share on: