• Main Menu
    • Mobile Software

      Mobile Software

      Mobile software refers to software that can be stored and executed on a mobile device such as a cell phone, PDA, smart phone, or similar device. Mobile software can range in its capabilities as some simply change the virtual appearance of the device while others provide important features such as menu layouts and password protection.

    • How Do I Find Out Who Owns an Email Address?

      How Do I Find Out Who Owns an Email Address?

      Finding someone’s email address can be quite difficult, but finding out who owns a specific email address is rather easy. While email and the Internet has provided millions of people a way to stay connected to each other, it also means that each person on the Internet leaves a footprint behind that shows who they

    • Tumbling

      Tumbling

      Tumbling exploits a weakness in the AMPS/NAMPS roaming system. In tumbling, you first configure the SIDH in your mobile telephone to pretend to be from another cellular carrier. If you are in Colorado, for example, you would configure your mobile telephone as if it were subscribed to a cellular carrier in Texas. Next, you modify

    • 66 block

      66 block

      A 66 block is a punch-down block used to connect wiring for telephone systems and other low-speed low-voltage wiring applications. A punch-down tool is used to force solid wire into metal slots on the 66 block. The 25-pair standard non-split 66 Block encloses 50 rows; each row has four columns of clips that are electrically

    • 1080p vs. 1080i

      1080p vs. 1080i

      Most TV buyers are looking for the highest quality picture possible. For those shopping for a TV there is a controversy brewing about which is better 1080p or 1080i. However, the truth of the matter is that for most people both of these formats will deliver the same quality picture. Here is why. 1080i and

    • Facial Recognition System

      Facial Recognition System

      Facial recognition systems are computer programs that are used for automatically identifying a person. Research on this technology started in the mid 1960s. This technology works by using several facial features in a person's image and comparing these with existing images in the database. Facial recognitions systems are used as an additional and mass security

    • How to Disable LoJack

      How to Disable LoJack

      LoJack refers to a GPS dependent tracking device that allows users to locate devices or vehicles that have been stolen. It is available in both a software version for computers and a hardware version for vehicles and communicates with GPS satellites to show a user where his/her stolen item currently is. LoJack can be activated

    • What is the Tyndall Effect?

      What is the Tyndall Effect?

      The Tyndall Effect refers to the reflection of light as it comes in contact with small particles in a translucent medium. It involves the scattering of light in different colors depending on how short or long a particular wavelength is. For example, the Tyndall Effect can describe the haze seen as light travels through a

    • Macintosh and Windows Server Integration

      Macintosh and Windows Server Integration

      Macintosh Services Overview While in the earlier days, it was somewhat difficult to integrate Macintosh networks and Windows networks because each operating system basically used different protocols, and files structures and systems. To deal with these integration issues, Microsoft has since introduced the File Server for Macintosh (FSM) and Print Server for Macintosh (PSM) services

    • How a Volcano Erupts

      How a Volcano Erupts

      A volcano is any opening in the Earth’s surface that allows molten rock and volcanic gases to escape from far below the Earth’s surface. Although many volcanoes are mountainous in shape, a volcano can exist in nearly any form, including volcanic vents on the ocean floor, ice volcanoes, which have been found on a variety

    174 queries in 0.611 seconds.