Windows Hot Keys allow computer users to conduct specific Windows operating system (OS) functions without having to navigate to application menus, which saves time. A common task that can be accomplished through Window Hot Keys is flipping a computer screen upside down. The resulting display can also be reversed with a similar method or by using applications found in the Windows Control Panel. How to Flip a Computer Screen Upside Down with Windows Hot Keys Step 1 – Press the “Ctrl” + “Alt” + “Down Arrow” keys simultaneously. The computer Read More
TCP/IP Ports
TCP and IP are two seperate protocols. IP (Internet Protocol) is a network layer protocol, while TCP (Transmission Control Protocol) is a transport layer protocol. Every computer and network device attached to the Internet has at least one IP address. For example, the IP address of this web server is 66.37.153.81. Then, within each of those IP addresses, each computer and network device will have a number of TCP ports. For example, the web server software on this web server responds on TCP port 80 and the mail server software Read More
Understanding Host Name Resolution
Understanding the Purpose of Host Names In TCP/IP based networks, the packets that are transmitted over the network contain the following IP addresses: The IP address of the computer sending the packet The IP address of the destination computer intended to receive the packet. The IP address information is used to forward the packet to the destination computer. The IP addresses of computers therefore have to be both unique and correct so that they can be forwarded to the correct destination. IP addresses also contain the following important information: Network Read More
How to Change a Yahoo Messenger Password
To change a Yahoo Messenger Password, visit Yahoo: Change Password. Changing a Yahoo Messenger password changes all passwords for Yahoo’s personalized services including: Yahoo! Mail Yahoo! Chat My Yahoo! Yahoo! Finance The instructions to change a Yahoo Messenger password will only work if the user knows his/her current Yahoo Messenger password. If the user’s Yahoo Messenger password is lost, he/she should refer to How does Yahoo Messenger password recovery work?.
Configuring Linux DHCP Server
Configuring Linux DHCP Server Overview of Linux DHCP DHCP basically stand for the dynamic host configuration protocol. In other words you can say it describes that how your computer is attached with networks.. Assigning an IP address dynamically is basic task assigned to DHCP along domain name, name server, gateway, host name and net mask. DHCP can provide the other information like time server etc and has capability to save your lots configuration work in your organization and company as well. The Linux DHCP performs like this as mentioned above Read More
Computer Worms
Computer worms are programs that reproduce, execute independently, and travel across network connections. The key difference between a virus and worm is the manner in which each reproduces and spreads. A virus is dependent upon the host file or boot sector and the transfer of files between computers to spread, whereas a computer worm can execute completely independently and spread on its own accord through network connections. The security threat from worms is equivalent to that of viruses. Computer worms are skilled enough to do serious damage such as destroying Read More
Is there a Dish Network TiVo?
The TiVo is compatible with all Dish Network receivers that support IR control. IR control is provided all recent Dish Network receivers. However, there is no need to purchase a TiVo. Dish Network provides satellite receivers with built in DVR (Digital Video Recorder) capabilities. Dish Network provides two models of DVR receivers, one for standard definition and one for HDTV. Features of the Dish Network HDTV DVR include: Independently watch and record programming on two TVs TV1: View and record high definition or standard definition programming TV2: View and record Read More
How to Enable Regedit
Windows registry The Windows Registry is a focal database that holds all the settings pertaining to Windows operating systems. It includes data and settings for hardware, software, and user related information. Any change made to the system in terms of system settings, hardware or software is reflected in the Windows registry. The Windows registry can be used to view runtime information about active hardware and software, and it can also be used for troubleshooting and fixing Windows issues. However only advanced users can view and edit settings in the registry, Read More
What is Twitter and How Does It Work?
Twitter is a social networking site that relies on micro-blogging for communication. By typing short, 140 character messages users can communicate with their followers and get information spread around. Since its inception, Twitter has grown and turned into a massive site used by main stream media as well as average individuals to communicate about important issues, random issues, or just about what they’re doing at any time. It allows people to blog in short bursts, a practice also known as microblogging. Twitter was created by Jack Dorsey who wanted to Read More
About Blank
About: Blank is a program that hijacks your computer through the form of adware. Once it enters your computer, it takes control of the browser, the settings of your Internet connection and displays popup advertisements. While the About: Blank doesn’t do anything negative to your computer, per say, it does result in a waste of time and can open the door for other malware to enter and create flaws in the system. You’ll know that you have About: Blank on your computer because it is a leach on virtual memory. Read More
Share on: