• Main Menu
    • How Firewall Protection Works

      How Firewall Protection Works

      Firewall protection works by blocking certain types of traffic between a source and a destination. All network traffic has a source, a destination, and a protocol. This protocol is usually TCP, UDP, or ICMP. If this protocol is TCP or UDP, there is a source port and a destination port. Most often the source port

    • How to Install Active-X

      How to Install Active-X

      ActiveX is designed to be a framework to allow software components to be reused independent of the programming language used in development. One or more of these components can be used for development of software applications and digitally signed to validate the identity of the author of the component. First developed in the mid-1990’s by

    • The Certificate Enrollment Process

      The Certificate Enrollment Process

      While encryption can be a robust security technology, users have to implement a public key infrastructure (PKI) to make it beneficial and trusted within an organization. The Windows 2000 and Windows Server 2003 PKI implementation resides in Certificate Services. A public key infrastructure is the collection of technology, protocols, services, standards, and policies that control

    • How to Remove iTunes AAC Protection

      How to Remove iTunes AAC Protection

      Apple’s iTunes is a hugely popular music service with millions of dollars in sales over the last few years. The music that iTunes generally sells, is in a format called AAC. This format includes DRM (digital rights management). Unlike standard MP3’s, music in the AAC format will play fine on an iPod, but probably won’t

    • HTTPS

      HTTPS

      Do you do banking transactions online? When you transfer funds, pay bills or accept payments through the Internet, you may notice that some Websites and portals you may be using have web addresses that start with https://, which is different from the usual http://. You may wonder how could it be and why is such

    • D-Link Default Password

      D-Link Default Password

      D-Link is a computer equipment brand that specializes in producing networking devices such as routers, modems, and network storage devices. D-Link routers, in particular, are often found in both residential and commercial environments and a wide variety of individuals use them to maximize the potential of their Internet access. D-link routers often contain two or

    • What Causes Lightning?

      What Causes Lightning?

      Lightning can be described as a massive discharge of electrical energy that can reach the speed of 130,000 mph and can exceed temperatures of 30,000 degrees Celsius. Although we know a lot about this phenomenon, it is still unclear how and why lightning forms. We will mention some of the theories on how lightning is

    • Ethernet at the Data Link Layer

      Ethernet at the Data Link Layer

      Ethernet at the Data Link Layer Ethernet provides services corresponding to Layers 1 and 2 of the OSI reference model, and IEEE 802.3 specifies the physical layer (Layer 1) and the channel-access portion of the Data Link (Layer 2). In addition, IEEE 802.3 does not define a logical link control protocol but does not specify

    • Active Directory Security

      Active Directory Security

      Active Directory security is determined by the following components: * Security groups: A security group is a made up of a set of users, and is created to assign permissions to access resources, and to assign user rights to group members. Permissions control access to resources, while user rights define what actions users can perform.

    • How Mobile Phones Are Dangerous to Health

      How Mobile Phones Are Dangerous to Health

      Since the number of cell phone users has continued to increase to more than six billion subscriptions at the turn of the decade, a common question that continues to get asked is how dangerous are mobile phones to one’s health? This question has continued to be asked over the past several decades since mobile phones

    174 queries in 0.622 seconds.