Occasionally, one or more sectors on an otherwise good hard drive will go bad. When this happens, the data in those sectors may be lost, but the data on the rest of the disk will be unaffected and the disk is still completely usable. Those bad sectors cannot be repaired, but they can be marked as unusable. Once marked as unusable, the Operating System will know not to attempt to store data in those bad sectors. The total disk capacity will be decreased by the amount of storage space in Read More
How to Uninstall Ubuntu
Most often, when uninstalling Ubuntu–the most widely used version of Linux–what the person is done is replacing it with Windows. Therefore, to uninstall Ubuntu and therefore replace it with Windows, one must format the partition during the installation of Windows. This way, the space that was once Ubuntu goes to the Windows’ needs. When this is done, the Ubuntu is removed and, in its place, Windows appears on the hard drive. However, as more people begin to get comfortable with Linux, what is seen is a case of double booting. Read More
What is the Android Development Kit?
The Android Development Kit, also known as the Software Development Kit (SDK), is a software that Android directly provides that allows users to create their own Android applications. The Android Development Kit includes sample projects with their original source code, an emulator, development tools, and all of the necessary libraries needed to develop Android applications. The Android Development Kit, however, should not be confused with the JDK (Java Development Kit), which is another software required to develop Android applications. How the Android Development Kit Works In order to use Read More
How to Convert VGA to TV
VGA (Video Graphics Array) based systems can have interesting uses. Whether it is to simply connect a computer to a television or convert an HD signal which uses the standard VGA connector into RCA compliant signals, it is possible with the correct hardware tools. What is VGA? The video graphics array was designed for computers in the late 1980’s which have undergone several advancements in the past couple of decades. It is now one of the standard options used in HD televisions. The HD-VGA connectors usually use the same set Read More
Who invented the ENIAC?
The ENIAC is credited as being the first electronic general-purpose computer. The acronym stands for Electronic Numerical Integrator and Computer. Although earlier machines had many of the same qualities that the ENIAC exhibited, the ENIAC was the first Turing-complete digital computer capable of solving a range of computing questions. However, ENIAC was originally built as a war aid; one of its primary design goals was to aid the military in calculations for missile ballistics. The contract to design and build ENIAC was signed in June of 1943, and construction lasted Read More
Monitoring and Troubleshooting Internet Connectivity
Common Methods for Troubleshooting Internet Connectivity With the technology available today, Internet connectivity can be established in various ways: Remote access server Network Address Translation (NAT) Internet Connections Sharing (ICS) A direct connection by using a device such as a modem or network card Because of the various methods in which Internet connectivity can be established, and the manner in which certain organizations are dependent on the Internet for daily business transaction, it is important to have some knowledge on the methods which you can utilize to troubleshoot Internet connectivity Read More
WPA (Wi-Fi Protected Access)
WPA (Wi-Fi Protected Access) is an interim standard by the WiFi Alliance to comply with the security protocol designed for wireless security. WPA will most likely be rolled into an eventual IEEE 802.11i standard. This protocol was an outcome of numerous severe flaws researchers had discovered in the preceding wireless security system called Wired Equivalent Privacy (WEP). WPA (W-Fi Protected Access) Modes of Operations WPA (Wi-Fi Protected Access) features two very different modes of operation: WPA Enterprise Mode WPA PSK (Pre-Shared Key) Mode Requires an authentication server Does not require Read More
Free Android Software
What is Android Software? Android software is a program that is capable of running on the Android mobile operating system provided by Google. Android is an open source operating system that anyone can make modifications to or create applications that can run with it. This differs dramatically from other mobile operating systems that are vendor-specific and are not interchangeable with other models and brands. Because Android is an open source, its software is also an open source, making Android software very compatible with other systems and popular among those systems' Read More
Error Number: 0x800CCC0E
Error Number: 0x800CCC0E occurs in the Microsoft Windows family of operating systems when there is a problem with Microsoft Outlook Express. A conflict with Simple Mail Transfer Protocol (SMTP) servers while using one of the Microsoft Outlook Express programs to read or browse through mail traditionally causes the error. The full text associated with the error may be: “The connection to the server has failed. Account: , Server: , Protocol: SMTP, Port: 25, Secure (SSL): No, Socket Error: 10051, Error Number: 0x800CCC0E.” What Causes this error? The Error Number: 0x800CCC0E Read More
Netscape Navigator Stored Password Recovery
Netscape Navigator stores usernames and passwords for web sites which you have logged in to. Password storage is configured in Netscape Navigator under <Edit>, <Preferences>, <Privacy and Security>, <Passwords>. By default, Netscape Navigator stores all passwords unencrypted. Viewing Netscape Navigator stored passwords The usernames and passwords are stored are part of the Netscape Navigator user profile. The location of the Netscape Navigator user profile varies between versions and installations. My Netscape Navigator user profile is stored in C:Documents and SettingsWillApplication DataMozillaregistry.dat. Netscapass will help you view stored Netscape Navigator passwords: Read More
Share on: