The two types of authentication are Mutual Authentication and NTLM. Mutual Authentication requires both the server and the client to identify them. NTLM only requires the client to be validated by the server. Two types of authentication are Mutual Authentication and NTLM Authentication. Mutual Authentication Mutual Authentication is a security feature in which a client process must prove its identity to a server, and the server must prove its identity to the client, before any application traffic is sent over the client-to-server connection. Identity can be proved through a trusted Read More
How to Encrypt an entire Disk
Sometimes instead of encrypting a file or a set of files, you want to encrypt an entire file system, partition, or disk. One of the chief advantages of this approach is that, once you have entered your encryption key, the encryption becomes transparent to both you and your applications. When you power off your computer, your data is securely encrypted. It is the best of both worlds. What is Whole Disk Encryption Whole disk encryption is a process in which every bit of data that is on a disk is Read More
Active Directory Operations Masters
When a change is made to a domain, the change is replicated across all of the domain controllers in the domain. Some changes, such as those made to the schema, are replicated across all of the domains in the forest. This replication is called multimaster replication. But few changes are practically not possible to perform with multimaster replication, so a domain controller known as Operations Master takes such type of changes to perform. Five Operations Master Roles are given to one or more domain controllers in each forest. Operations Master Read More
How Does Web Hosting Work?
Web hosting works by taking a website and connecting it to the Internet. Because the Internet is a collection of millions of computers all connected together, a web host has a series of servers that are connected to high speed Internet lines that allow data packets to be sent to and from the individual websites on the server. Web hosting works by handling a multitude of different websites on the World Wide Web. A web host works by serving the web page that is requested by a browser. For example, Read More
RG-11
Coaxial cables are necessary for rooftop antennas and dish antennas in order to provide crystal-clear sound and audio input. RG-11 bands typically have 75-ohm wires made of copper. Polyethylene dielectric makes sure that there is minimal loss of picture and sound while the antenna receives audio or video feeds. Most users of the RG-11 have reported high-quality resolution of the images transferred by these cables. RG-11 Specifications Type RG-11 RG-11A Impedance Z0(Ω) 75 75 Dielectric Solid Polyethylene Solid Polyethylene Time Delay (ns/ft) 1.54 1.54 Propagation Velocity (% of c) 65.9 Read More
Kinetoscope
A Kinetoscope is a device that shows older films or motion pictures through a viewing window. The device predates the movie projector and housing the viewing window in a cabinet. The kinetoscope’s basic concept served as the basis for movie projectors that were developed later. The kinetoscope produces the illusion of movement or animation by using perforated film strips that have sequential images that comprise the movie or film frames that are moved over a light source with a high-speed shutter. Who Invented the Kinetoscope? Thomas Edison was originally credited Read More
How to Post a Video on Facebook
Different media types can be displayed on a Facebook account through one’s profile page wall and status updates that are posted in one’s news feed. One of the most attractive media types that one can provide is video. Videos on Facebook add the elements of motion picture and sound rather than just a series of photos on the page. Posting a video on Facebook is possible through a variety of methods. Each method has its advantages and disadvantages. Record a Video Facebook is equipped with the ability to capture Read More
568B
EIA/TIA 568B is a standard for the pin arrangements of RJ-45 connectors on Unshielded Twisted Pair (UTP) wire. The 568B standard was developed by AT&T under the name 258A. 568B Color Codes Pin (Jack) Pin (Plug) Color Pair 1 8 White/Orange 2 – Tip 2 7 Orange 2 – Ring 3 6 White/Green 3 – Tip 4 5 Blue 1 – Ring 5 4 White/Blue 1 – Tip 6 3 Green 3 – Ring 7 2 White Brown 4 – Tip 8 1 Brown 4 – Ring Pin numbers are Read More
DVD Mastering
DVD Mastering is a digital optimization procedure that eventually readies a DVD project for duplication or reproduction. DV mastering is done for both audio and audiovisual projects, and with the right knowledge and software, can be done by just about anyone. DVD mastering procedures generally vary with the type of services sought and the form of source materials provided. For audio, the customer usually submits the DVD mastering service with a mix down of the finished product in two-channel digital and analog tracks. The mastering service in turn runs these Read More
Proxy Arp
ARP (Address Resolution Protocol) is used by network systems to convert system communications from the routable layer 3 ip protocol to the non-routable layer 2 data link layer protocols. In most cases, you don't need to modify this behavior at all, and system communications are optimal. In special circumstances it is preferable to have another system or network device answer arp requests for another system. This process is called proxy arp, because on network system is proxying for anothers ARP communications. Environments that use proxy arp There are few situations Read More
Share on: