SRT is the file extension for subtitle files. Subtitle files are simple text files that have been synchronized with a video file so that viewers can read what is being said while they are watching the movie. SRT files are especially useful for viewers who have hearing disabilities or like to keep the sound low. SRT files can be made for any movie in any language and can be modified in a standard text editor such as Notepad. Subtitle files are easy to create. Each subtitle line only consists of Read More
MPEG (Moving Picture Experts Group)
MPEG (Moving Picture Experts Group) is an International Standards Organization (ISO) group which sets standards for compressing and storing video, audio, and animation in digital form. Moving Picture Experts Group’s first meeting was in Ottawa, Canada, in May of 1988. Over the years, MPEG has developed to include around 350 members per meeting from several industries, research institutions, and universities. The official designation of Moving Picture Experts Group is ISO/IEC JTC1/SC29 WG11. Pronounced “m-peg”, the term MPEG represents the entirety of digital video compression techniques and the digital file formats Read More
File Sharing
A common practice in modern society is the use of file sharing programs and applications. These file sharing programs have been shrouded in controversy, scrutiny, and criticism since their inceptions. Despite that, however, file sharing programs are used by millions of people worldwide on a daily basis and that number is only growing. This article will examine what exactly file sharing is and explore some of the most popular P2P programs and file hosting sites that support the file sharing community. What is File Sharing File sharing involves many different Read More
DSLAM (Digital Subscriber Line Access Multiplexer)
Faster connections to the Internet from phone lines are possible through a Digital Subscriber Line Access Multiplexer (abbreviated to DSLAM). The role of this network device is located in the telephone exchanges of providers for the services. The service works by taking advantage of the multiplexing techniques used to connect several Digital Subscriber Lines to a high speed connection which they share. These can be placed along remote areas to provide DSL services to once out of reach locations. These additions may be costly to the telephone companies, but it Read More
What is Malleability?
Malleability refers to metals’ (and other hard materials’) ability to be stretched, shaped, or molded through applied pressure. While not all objects are malleable, most metals are. This is the reason that metals such as gold, silver, and platinum, are used to make jewelry and electronic circuits. Malleable objects can usually be reshaped and molded around other objects when pressure is applied to them via a hammer or roller. How Malleability Works Physical changes in metal are responsible for its deformation. When a malleable metal is compressed, individual molecules Read More
Cryptographic Algorithms
Symmetric Cryptographic Algorithms DES (Data Encryption Standard) is perhaps the most widely used cryptographic algorithm. DES is based upon IBM’s Lucifer algorithm. The NBS (National Bureau of Standards) and the NSA (National Security Agency) adopted DES as a federal standard in 1977. DES is a symmetric cipher with an effective key length of 56 bits. Triple-DES is a variant of DES which encrypts the plaintext with the DES algorithm three times. IDEA (International Data Encryption Algorithm) is a commercial symmetric cipher developed in 1990 which uses 128-bit keys. Blowfish is Read More
How DirecTV and Dish Network Stop Signal Theft
Reducing Signal Theft by Blacklisting Access Cards DirecTV maintains a list of cancelled access cards. If an access card with a blacklisted CAM ID is utilized, you will receive the “Call Extension 745” error message. Reducing Signal Theft with ECM (Electronic Counter Measures DirecTV and Dish Network engineers also broadcast hostile signals that instruct the satellite receivers to cause unauthorized access cards to stop working. These attacks are commonly known as ECM (Electronic Counter Measures). Common ECM attacks are: Datastream updates Datastream updates are new software which is sent to Read More
How to Use Ping to Test a Network
The following steps elaborate on how to use the Ping utility to perform progressively more distant tests on network connectivity. Ping the Loopback Address – Type Ping 127.0.0.1 Successfully pinging the loopback address verifies that TCP/IP is both installed and configured correctly on the local client. If the loopback test fails, it means IP stack is not answering. If any TCP drivers get corrupted, the network adapter is not functioning properly, or any other service is interrupting IP , then lack of response might occur. Open event viewer and look Read More
Teleportation
In 1931, Charles Fort, an American writer, tried to describe the random disappearances and appearances of different anomalies. He felt that these sudden disappearances and appearances were connected and therefore felt that they were "teleporting." While he came up with this theory to try and explain why certain paranormal phenomena acted, many suggest that Fort probably didn't subscribe to the theory and was using it as a way of suggesting mainstream science didn't provide enough information on why these phenomena happened. Dematerialising This is the transmission of data from one Read More
ICMP (Internet Control Message Protocol)
ICMP is the Internet Control Message Protocol. ICMP is a complementary protocol to IP (Internet Protocol). Like IP, ICMP resides on the Network Layer of the OSI Model. ICMP is designed for sending control and test messages across IP networks. Unlike the Transport Layer protocols TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) which operate on top of IP, ICMP exists alongside IP. The ability to understand ICMP is a requirement for any IP-compatible network device. However, many security devices such as firewalls block or disable all or part Read More
Share on: