Email phishing scams have been around just about as long as email itself. The term email phishing refers to the act of maliciously sending a fake or fraudulent email in order to trick the receiver into visiting a malicious website, downloading a malware infected email attachment, or purposely giving up vital pieces of private information. The next generation of phishing attacks is referred to as spear phishing. This attack is similar to traditional phishing, except that the phishing email is only sent to people in a small, related group such Read More
What is Fair Use?
Fair use is a principle present in US copyright law that pertains to the usage of copyrighted material in a limited manner, without prior consent from the copyright holders. Fair use of copyrighted material refers to the limited usage of such material for the purpose of criticism, commentary, teaching, research and news reporting. Fair use and its related guidelines were clearly defined in 1976 under section 17 of the United States Copyright act. As per section 17 of the United States Copyright act, fair use is considered valid if the Read More
USB to Ethernet Adapter
USB (Universal Serial Bus) is a hardware specification that allows a connection to be established between a source device and a peripheral device. Most modern electronic devices include at least one built-in USB port and can use USB technology to connect to other devices, such as keyboards, mice, cameras, flash drives, external hard drives, printers, media players, wireless network adapters, game consoles, and cell phones. USB technology allows devices to share data and is widely used to transfer files to an external storage device. Additionally, USB technology can supply power Read More
POTS (Plain Old Telephone Service)
POTS (Plain Old Telephone Service), also known as PSTN (Public Switched Telephone Service), refers to the dominant telephone service in most residential and small business environments. A telephone company controls POTS, which allows consumers to make and receive calls on one line at a time. POTS differs from PBX, T-1, T-3, ISDN, VOIP, and other digital telephone services, which provide telephone services to multiple lines at a time and usually include many advanced features that POTS does not have. How POTS Works POTS relies on a telephone cable that Read More
iPad Tethering
An iPad is a tablet PC that Apple produced, which provides the hardware and software components found in both Mac PCs and iPhones. While iPads are not as large as Macs or as small as iPhones, they are able to perform the same tasks as a computer while also being extremely lightweight and portable. iPads generally include support for touch screen, WiFi, Bluetooth, and 3G as well as tethering to other devices. What is iPad Tethering? iPad tethering is a term used to describe the iPad’s compatibility with another Read More
S-Video
S-Video is an abbreviation for Separate Video and is also known as the Y/C. it is an analogue video signal that carries the video data as two separate signals; these signals are luma (brightness) and chroma (color). The S-Video can be thus contrasted with composite video, which carries picture information as a single component, albeit of a poor quality. Another signal is called component video and this one carries picture components in three separate signals, one luma and two chroma components. Basically, S-video is used to transmitting a television signal Read More
How Solar Panels Work
Solar panels are technically any kind of panel that uses solar thermal energy to produce electricity. There are a variety of panel types, from those used to heat water as with solar hot water panels, to those which are used to store solar energy, such as solar thermal energy panels. Furthermore, a solar panel can be described as a photovoltaic panel, which is what is used in the professional solar power industry to generate electricity from the rays of the sun. Despite the type of solar panel being discussed, almost Read More
Queues
A queue is a line of persons waiting for their turn at some service counter. The service counter can be a ticketing window of a cinema hall, a railway station, etc. Depending on the type of service provided by the service counter and number of persons interested in service, there could be queues of varying lengths. The service at the service counter is on the first come first serve (FCFS) basis, i.e., in order of their arrival in the queue. Suppose that at a service counter, t1 units of time Read More
Top IT Security Threats
Security has always been a priority concern of IT professionals, especially the Chief Information Officers (CIOs) who hold ultimate responsibility for their company’s computer and Internet security. In the years since the Internet first came on the scene, the security scenario has undergone rapid changes and developments as threat and counter-threats have been developed and deployed. Recent surveys tend to confirm this perception. While IT security threats continue, the form and nature of these threats may not be what most people expect – or even suspect. The following are the Read More
Subscriber Connectors (SCs)
The Subscriber Connector (SC) is a fiber optic connector with a push-pull latching mechanism that provides quick insertion and removal while ensuring a positive connection. The SC is also available in a duplex configuration. It has a benefit in keyed duplex capability to support send/receive channels. This connector is commonly used for most modern network applications. The SC is a snap-in connector that is extensively used in single-mode systems for its remarkable efficiency. Subscriber Connectors are inexpensive, trouble-free, and robust. They give precise positioning via their ceramic ferrules. The square Read More
Share on: