Alternative Newsgroups (ALT Newsgroups) are devoted to specific (sometimes controversial) topics. ALT newsgroups are rarely moderated and almost anyone can create one. A newsgroup is like a forum where participants can reply to previous posts and follow a newsgroup relevant to their interests by subscribing to it free of charge. Since ALT newsgroups are rarely moderated, participants can also create their own newsgroup about anything, from ranting or raving about a movie to informing others about a current political issue. Other Usenet users can access and react to the participant’s Read More
US Virtual Fence Proposal
The Virtual Fence proposal is a project funded by the United States aimed at curbing the number of illegal immigrants and smugglers entering into the United States through the Canada and Mexico borders. This plan is part of the Secure Border Initiative which aims to enhance the effectiveness of the physical fencing already present in these borders. Components of the Virtual Fence Components of the Virtual Fence project includes border control vehicles equipped with state of the art computers, unmanned aerial vehicles, high powered cameras, including infrared cameras capable of Read More
How to Recover Deleted Text Messages from an iPhone
The iPhone, which Apple created, is a media device that combines the functionality of a phone, computer, camera, and media player. It features touchscreen technology that allows users to browse the Internet, select files, and run applications by simply touching the screen. The iPhone also supports Bluetooth technology and wireless Internet in order to allow the user to access the Internet and file sharing services from anywhere within the user’s network service range. However, the iPhone’s most important feature is its ability to store and access files in the same Read More
How to Solder Copper Pipe
By using a torch and solder–a metal alloy that melts at around 90 degrees Celsius up to 400 degrees Celsius–connecting two copper pipes together has never been easier. As the solder melts, it fills into the tiny spaces between two copper pipes and applies a force that holds it firmly in place. Once this is done, there can be a leak free seal between two copper pipes or a pipe and a connector. Soldering Copper Pipes Properly To begin with, make sure that you have a torch and solder. Without Read More
MTU (Maximum Transmission Unit)
The MTU (Maximum Transmission Unit) is the size of the largest datagram that can be sent over a network. If a datagram is larger than an MTU, the datagram must be fragmented into multiple smaller datagrams. Default MTU Sizes Most network technologies have default MTU sizes which may be changed by the network administrator. Network Default MTU PPP 296 X.25 576 IEEE 802.3 1,492 Ethernet 1,500 FDDI 4,352 4Mb Token Ring 4,464 16Mb Token Ring 17,914 Hyperchannel 65,535 The term PMTU (Path MTU) is sometimes used to describe the MTU Read More
How to Block an E-mail
It can be very frustrating when mass forwards clutter one’s e-mail inbox. Sometimes simply replying to the forwards and asking to be removed from the list is effective, but when it is not there is the option of blocking the e-mail address that the forwards are coming from. Blocking an e-mail address is not as effective for spam as it is for forwards. People who send spam can use a new address (domain) for nearly every e-mail they send out. Only block e-mail addresses of individuals who send e-mails that Read More
How to Burn a MKV File
MKV, or Matroska Multimedia Container, is an open source, file container format. MKV files are able to store an unlimited number of video, audio, and subtitle files within one file. Matroska files use the .MKV file extension for video files that contain audio and video, the .MKA file extension for audio files, and the .MKS file extension for subtitle files. MKV files are often used to store small collections of videos or multiple parts of the same video. Because of their ability to store an unlimited number of subtitle files, Read More
Cryptanalysis
Cryptanalysis is the science of making encrypted data unencrypted. Cryptanalysts Practitioners of cryptanalysis are known as cryptanalysts. Cryptanalysis in Context A cryptographer will use cryptography to convert plaintext into ciphertext and a cryptanalyst will use cryptanalysis to attempt to turn that ciphertext back into plaintext. Both the cryptographer and the cryptanalyst are cryptologists. Cryptography and cryptanalysis are the two sides of cryptology.
Kerberos
Kerberos is a network authentication protocol which utilizes symmetric cryptography to provide authentication for client-server applications. Kerberos Standard Definition Kerberos is defined in RFC 1510 – The Kerberos Network Authentication Service (V5). Kerberos Architecture The core of Kerberos architecture is the KDC (Key Distribution Server). The KDC stores authentication information and uses it to securely authenticate users and services. This authentication is called secure because it: Does not appear as plaintext Does not rely on authentication by the host operating system Does not base trust on IP addresses Does not Read More
MP4 Media Player
With the waves of modern society come waves of modern technology. One of these waves can be seen by the ever-popular, ever-expanding MP4 technology that has swept the globe in recent years. Invented in 2003, MP4 files have been used ever since to create some of the greatest motion pictures and music portfolios of all time. With those files, however, comes the need for media players to play them. To help the reader learn more about MP4 files and the media players that play them, this article will be split Read More
Share on: