Advert

AC3 (Audio Coding 3)

Last edited by . Total of no comments in the discussion.

AC3, or Dolby AC-3, is a lossy audio format created by Dolby Digital that is used in cinemas, television broadcasts, DVDs, Blu-Ray Discs, and game consoles. While AC3 was never designed to replace MP3 files, it has grown in popularity in the PC audio industry and is now recognized and supported by many media players and devices. However, AC3 is mostly used in audio/video recordings and is rarely separated from video files. How AC3 Works Because AC3 is a lossy audio format, it discards information when it is compressed. Although Read More

Share on:

Molex Connectors

Last edited by . Total of no comments in the discussion.

Molex connectors are pin and socket types of connectors that are found in a multitude of products. Their name stems from the Molex Products Company, the business that originally designed and helped standardize the type of connection in the 1950s and 1960s. Although they were originally designed for use in appliances, they are currently a standard in computer and automobile electronics. The Molex connectors of today are designed very simply. One piece of the two piece pin and socket design consists of metal pins while the other piece consists of Read More

Share on:

How Do I Share my Calendar in Outlook Express?

Last edited by . Total of no comments in the discussion.

Your calendar is probably so full of reminders like doctor’s visits, parties, meetings and birthdays that your friends, families and co-workers need to see it just to figure out where they “fit in your schedule”. Outlook makes it easy to share your calendar with family and friends! Go to your Calendar and in the Navigation Pane, click Share My Calendar. If it doesn’t appear, that means you aren’t using an Exchange server email account. If you are using a POP3 (Yahoo, MSN, etc.) or some other account, it won’t work. Read More

Share on:

Basic Unix Commands

Last edited by . Total of no comments in the discussion.

The total number of Unix commands is immense. No normal user or system administrator would ever need to know them all. The Unix commands available to you will vary based upon several factors: The version of Unix you are using (FreeBSD, Linux, Solaris, AIX, HP-UX, OpenBSD, etc…) The Unix shell you are using (sh, csh, tcsh, ksh, bash, etc…) The packages installed on the system and the way the system is configured Your access level on the system This list of basic Unix commands will get you started using and Read More

Share on:

Cryogenics

Last edited by . Total of no comments in the discussion.

Cryogenics is the branch of physics that deals with the production of extremely low temperatures – usually lower than -238 degrees Fahrenheit – and it specifically looks into how materials behave when they are exposed to such temperatures. The experiments performed by Sir Humphry Davy and Michael Faraday paved the way for this new field of physics. Popular literature, however, often mixes up cryogenics with cryonics or the use of cryogenics to preserve biological matter. Cryogenics, literally "cold production," is also a commonly used term when referring to a state Read More

Share on:

802.11g

Last edited by . Total of no comments in the discussion.

802.11g is one of the standards used for high speed wireless networks, commonly known as Wifi. This standard was created by the IEEE (Institute of Electrical and Electronics Engineers) in June of 2003 and uses a 2.4 to 2.5 gigahertz radio frequency to send and receive data from one device to another. There are several standards that are in use today for wireless communication, others include 802.11a, 802.11b and 802.11n. The standard 802.11g is becoming quite popular during the last several years for its speed, quality of transmission and competitive Read More

Share on:

How to Password-Protect Folders

Last edited by . Total of no comments in the discussion.

With fast-access computers and interlinking networks that connect many different devices together, many users worry about other people stumbling upon their personal information. With the dangers of the Internet aside, users still have to be concerned about their friends, relatives, and co-workers accessing their computer and seeing things that they would rather keep private. Because of this, there are dozens of programs available that are able to protect users' files and folders with a password and various encryption methods. This article will explain what encryption software is and list a Read More

Share on:

Westell Default Passwords

Last edited by . Total of 1 comment in the discussion.

Westell is a provider of DSL routers and other DSL-based devices that telephone companies and DSL subscribers use for wireless Internet in homes or offices, instead of using cable or satellite Internet. Westell products generally have the same features as other routers, such as dual antennas, four Ethernet ports, and WPA encryption, but connect to the Internet through a telephone wire. The Westell wireless router has been used since mid-2004 as BellSouth’s default Internet router. The router features 802.11 wireless support, four Ethernet ports, and a built-in firewall. Similar to Read More

Share on:

Choosing a DirecTV HD LNB

Last edited by . Total of 1 comment in the discussion.

To receive all of the DirecTV HD channels you must have, at minumum, a triple LNB that receives transmissions from the DirecTV satellites at 101, 110 and 119 degrees West longitude. The DirecTV satellite dishes which support the triple LNB include: DirecTV Phase II Plus Dish DirecTV Phase III Dish Alternative, for future compatability with DirecTV’s new Ka Band MPEG-4 HD programming, you can use the AT9 MPEG-4 Compatible Ku/Ka Band dish with five LNBs. With an older satellite dish with only one or two LNB’s, you will be able Read More

Share on:

How to Connect a Bluetooth Headset

Last edited by . Total of no comments in the discussion.

Bluetooth is a wireless communication protocol which is used to exchange information or data over short distances, with the help of fixed or mobile devices. Bluetooth wireless technology is integrated into these kinds of electronic devices to enable users to exchange information such as music, videos, and pictures wirelessly. Bluetooth technology was created in 1994 by engineers working at Ericsson, Sweden. The Bluetooth Special Interest Group was formed in 1998 by various companies to develop, maintain, and license Bluetooth standards. Bluetooth is implemented with the help of a radio technology Read More

Share on: