• Main Menu
    • How Do Oil Booms Work?

      How Do Oil Booms Work?

      Oil spills can occur with little to no notice. When a spill does happen, it becomes critical to act quickly to contain the spill in order to mitigate damage to the environment. Oil booms are commonly used in maritime environments as both a reactive action to a spill or as a preventative measure around ships

    • Who Discovered Quantum and Particle Physics?

      Who Discovered Quantum and Particle Physics?

      During the nineteenth century the main theory in physics was still Newtonian Mechanics. With the advances in electricity, magnetism and the studies about light, it was clear that the theory had its limitations. The limitations appeared in the limits of the too small (atomic size) or the too fast (light speed). The study of the

    • FLV Files

      FLV Files

      Over the last couple of years video has become a staple of the internet. Not only have computers become more powerful and equipped to handle video images, but many websites now rely on video as either a source of entertainment or a way to transmit information. One of the most popular video files found on

    • Dual LNB

      Dual LNB

      A dual LNB (Low Noise Block-Down Converter) is an LNB system that features two outputs rather than one and allows satellite television subscribers to watch multiple channels on separate television sets simultaneously. Dual LNB systems use only one parabolic satellite dish, but have two cable connections that are connected to separate televisions in the user’s

    • Text Message Shortcuts

      Text Message Shortcuts

      Most people send text messages from the very small keypads on their mobile phones, and most people who receive text message messages read them on the tiny screens of their mobile phones. Because of those considerations, and because many service providers limit text messages 160 characters in length, most people who use text messages learn

    • How to Find Out CPU Utilization in UNIX

      How to Find Out CPU Utilization in UNIX

      Keeping track of your CPU’s performance is extremely important. In UNIX, you can accomplish this task by using the system utilities and commands. For those who would like to find out their CPU utilization, one command is extremely important. It is called SAR – System Activity Reporter. The SAR commands make accessing CPU performance quite

    • How to Uninstall Internet Explorer

      How to Uninstall Internet Explorer

      Uninstalling Internet Explorer because it is giving problems or for any other reason is a relatively simple task. How to Uninstall Internet Explorer Click the “Start” button on the desktop’s bottom left hand corner. Double click “Control Panel.” The Control Panel window will open and display a variety of tasks. Double click “Add or Remove

    • Bonjour Service

      Bonjour Service

      The Bonjour service is an Apple, Inc. implementation of a service discovery protocol. It permits an application to find devices, services, and other computers on a network without configuring a DNS server or directory service by making use of the multi-cast network protocol. Although Bonjour started as a proprietary Apple networking protocol, the company has

    • How Thunderstorms Form

      How Thunderstorms Form

      There are three stages to a thunderstorm’s life cycle: the cumulus stage, the mature stage, and the dissipation stage. When a thunderstorm begins to form, it does so at the cumulus stage. From there, the storm advances in severity until it reaches its peak at the mature stage and then begins to gradually die out

    • IP Address Spoofing

      IP Address Spoofing

      IP address spoofing denotes the action of generating IP packets with fake source IP addresses in order to impersonate other systems or to protect the identity of the sender. Spoofing can also refer to forging or using fake headers on emails or netnews to – again – protect the identity of the sender and to

    174 queries in 0.654 seconds.