Editorials All posts
Waging Guerrilla Warfare Against Big Data
Organizations across the globe are amassing huge repositories of data on every living person on ...
7 Fun Yet Productive Ways to Kill Boredom on The Internet
Photo by Richard Eriksson It’s actually pretty strange how can anyone in this day and ...
Why Built-In Optical Drives and HDDs No Longer Make Sense
Optical Drives As far as optical media such as DVDs and CDs go we seem ...
Networking All posts
VoIP (Voice over Internet Protocol)
VoIP (Voice over IP) includes communication protocols, technologies and techniques of transmission used for multimedia ...
Electronics All posts
Circulators
A circulator is a box-shaped ferrite device that has three or four ports and allows ...
IT Management All posts
Application Service Provider
An Application Service Provider or ASP provides “applications” as a service – specifically, software and ...
Mobile Telephony All posts
IMSI (International Mobile Subscriber Identity)
IMSI (International Mobile Subscriber identity) is the information that is used for identification of a ...
Microsoft Windows All posts
How to Install Fonts
Fonts are typefaces that we see on the monitor screen. Arial and Times New Roman ...
Wireless Networks All posts
How to Change WEP to WPA
Changing WEP to WPA is a great way to increase a wireless network’s security. These ...
MIC (Message Integrity Check)
A message integrity check (MIC), is a security improvement for WEP encryption found on wireless ...
Wireless Access Point
Wireless Access Point (WAP) is essentially hardware equipment that enables wireless devices to connect to ...
Passwords All posts
How to Change Your Streamyx Password
TM Net provides the Streamyx broadband Internet service in Malaysia. The service speeds range depending ...
How to Reset a MySQL Password
A MySQL password can be reset in 5 easy steps: Stop the mysqld daemon process. ...
Trendnet Default Password
Trendnet advertises itself as an Ethernet based device manufacturer, but also boasts a large collection ...