Advert

How to Remove a Browser Hijacker

Last edited by . Total of no comments in the discussion.

Browser hijackers are malicious programs that redirect computer users to websites that the hacker wants and deploy the computer malware. The hijacker may change a computer’s default homepage or redirect computer users trying to visit legitimate websites such as their bank or Google to a maliciously crafted copy of the site to deploy computer malware to the computer or steal the user’s data. Most browser hijacks are based on adware, and to a more limited degree, spyware functions. How do Browser Hijackers Infect Computers? When a computer browser is hijacked, Read More

Share on:

Solder

Last edited by . Total of no comments in the discussion.

Solder is a metal with a low melting point that is used to create the conductive joints between components and tracks in electrical circuits. There are many types of solder used for different metals, but the most common solder used for electronics is an alloy of tin and lead. Solder Flux Flux is essential for making good solder joints. It removes the thin film of surface oxidation that prevents two metals sticking together. It also prevents more oxidation occurring during soldering. Heat causes the flux to change it's chemical structure Read More

Share on:

How to Install Active-X

Last edited by . Total of 5 comments in the discussion.

ActiveX is designed to be a framework to allow software components to be reused independent of the programming language used in development. One or more of these components can be used for development of software applications and digitally signed to validate the identity of the author of the component. First developed in the mid-1990’s by the Microsoft Corporation, ActiveX controls are used by Windows Media Player, Microsoft Office, Internet Explorer, and Microsoft Visual Studio and can be embedded into web pages for added functionality. A common task that arises for Read More

Share on:

How to Audit Windows NT/2000/XP Passwords

Last edited by . Total of no comments in the discussion.

Microsoft Windows NT/2000/XP passwords are encrypted as 32-bit one-way hashes using the MD4 messages digest algorithm. This is similar to the way that Unix stores passwords, although the hashing algorithm is different. For compatibility with legacy Microsoft LAN Manager software, Windows NT/2000/XP also stores the passwords redundantly as a 56-bit DES (Data Encryption Standard) hash. This 56-bit hash is created by splitting the password into two 7-character uppercase strings, and then converting each to a 56-bit DES key which both then encrypt the string “KGS!@#$%” and concatenating the results. This Read More

Share on:

Rheometer

Last edited by . Total of no comments in the discussion.

A rheometer is a device that was developed to measure how a liquid’s suspensions or slurries flow when force is applied to it. Many fluids can be tested with a rheometer when a single numerical viscosity value cannot determine them due to their components. A rheometer can also be used to discover the additional parameters and values that a viscometer can correctly measure. In other words, the rheometer tests a fluid’s rheology. There are two types of rheometers that test a liquid’s rheology. There is an applied shear stress/strain option Read More

Share on:

Trunking

Last edited by . Total of no comments in the discussion.

Traditional radio equipment works because all parties involved in the communication agree on what frequencies they will utilize. Traditional radio scanners work by scanning for and then listening to those frequencies. Trunking radios, on the other hand, constantly renegotiate the frequencies utilized for the conversation. This allows for more efficient utilization of limited frequencies because each conversation does not require a dedicated channel. However, it also makes it very difficult to scan trunked conversations because you do not usually know what frequency the next portion of the conversation will appear Read More

Share on:

How Does a Processor Work?

Last edited by . Total of no comments in the discussion.

A computer processor is commonly referred to as the CPU, or central processing unit of a computer. The processor is the primary component of a computer designed to move and process data. Computer processors are commonly referred to by the speed that the CPU can process computer instructions per second measured in hertz and are one of the primary selling points of a computer. How Does the Processor Work? The computer processor acts as the primary coordinating component of the computer. The CPU will access programs, data, or other computer Read More

Share on:

DASD (Direct Access Storage Disk)

Last edited by . Total of no comments in the discussion.

A DASD, or Direct Access Storage Disk, is a type of storage device that is connected directly to a user’s computer rather than being connected to the network. Because many types of storage device connect directly to a user’s computer, the term “DASD” may apply to a variety of different devices; however, a DASD is typically a storage device that contains a significant amount of memory and a relatively low access time. For example, desktop servers and external hard drives are good examples of DASDs, although flash drives and SD Read More

Share on:

Projector Lumens

Last edited by . Total of 5 comments in the discussion.

Projectors have quite a variety of uses these days, whether in the boardroom or classroom to give a presentation, or the home to project digital, high definition TV and video to a screen. While there are many aspects that determine whether a projector will project high quality images (e.g. resolution, contrast, etc.), one type of measurement that users should be aware of is Lumens. What are Lumens? Lumens are a unit of measurement of the total brightness that comes from a light source, in this case, a projector. One may Read More

Share on:

How to Backup iTunes

Last edited by . Total of no comments in the discussion.

Since the release of iTunes in 2001, a significant number of computer users have used the proprietary application as their primary means of managing multimedia files on their computer. Unfortunately, there is no inherent redundancy built into the iTunes program to help guard against computer hard drive failure, significant malware infection, etc. As a result, most iTunes users have to backup iTunes after their music and movie library have grown to a significant size. Before backing up iTunes, however, you will need to consolidate your iTunes library. How to Consolidate Read More

Share on: