• Main Menu
    • Infrared Sensors

      Infrared Sensors

      An infrared sensor is a device that emits and/or receives infrared waves in the form of heat. While most infrared sensors transmit and receive infrared waves, some can only receive them. These types of infrared sensors are known as Passive Infrared Sensors (PIR sensors) or motion detectors. What is an Infrared Detector? An infrared detector

    • Data Mart

      Data Mart

      Most people are familiar with terms like data warehousing, data mining, and data cleansing, but fewer people are familiar with data mart. A data mart is a subsection of a data warehouse that deals with specific information. Much like the chapters of a book, a data mart contains related information that deals with the same

    • Blue Screen of Death

      Blue Screen of Death

      If you have been working on computers or are just starting to use them, one of the most disturbing events that can occur is the BSOD or Blue Screen of Death. The BSOD is actually an error screen that is displayed by specific operating systems informing the user that a critical system error has occurred.

    • msicuu2.exe

      msicuu2.exe

      Msicuu2.exe is the Windows Installer Cleanup Utility process, a program found in many older Windows versions that forcibly uninstalls programs that refuse to be removed through the Windows Control Panel’s Add/Remove feature. While the Windows Installer Cleanup Utility was discontinued in 2010 due to problems associated with Office 2007, many people still use it. Msicuu2.exe

    • Browser Cookie

      Browser Cookie

      A browser cookie is a small piece of information sent by a web server to a web browser to be stored for future use. The data in the browser cookie will be sent back to the web server whenever the browser reconnects to the web site. Cookies are commonly used to store user preference information,

    • Runtime Error

      Runtime Error

      A runtime error is a computer error that appears in the form of a message box consisting of a particular code along with its corresponding definitions. Usually, a user will notice that the computer becomes noticeably slow before a runtime error appears. After the runtime error message has been displayed and closed, the software that

    • How to Backup Unix

      How to Backup Unix

      Most Unix systems come with several basic backup software options, including dd, cpio, tar, and dump. If the basic backup software included with Unix does not meet your needs, you may want to look at some of the more comprehensive software packages designed to backup Unix and Windows systems. Built-in Unix Backup Software tar tar

    • How to Enable ActiveX Controls

      How to Enable ActiveX Controls

      ActiveX is a software structure created by Microsoft. It contains re-deployable software modules known as controls which are utilized to perform a unique function or set of functions within the confines of Microsoft Windows. These controls can be brought together to work as a complete software application itself. ActiveX controls are based on the Component

    • Shared Folder Permissions

      Shared Folder Permissions

      Shared folder permissions are used to restrict access to a folder or file that is shared over a network. Folder sharing is normally used to grant remote users access to files and folders over a network. Web sharing grants remote users access to files from the Web if Internet Information Services (IIS) is installed. Members

    • SQL Injection Attack / Vulnerability

      SQL Injection Attack / Vulnerability

      A SQL injection vulnerability can occur when a poorly-written program uses user-provided data in a database query without first validating the input. This is most-often found within web pages with dynamic content. There are some excellent tutorials and descriptive articles on this subject, as well as many vulnerability postings for different applications from full-disclosure websites.

    174 queries in 0.554 seconds.