• Main Menu
    • How to Develop Android Apps

      How to Develop Android Apps

      An Android is a smartphone that Google created that combines the functionality of a cell phone and a computer. While the Android does not include many features that a real computer does, it allows the user to take advantage of a wide variety of applications that can be used to perform diverse tasks that the

    • Fiber Optic Internet

      Fiber Optic Internet

        Everyday, data transfer rates are getting faster and faster as technology gets better and demands get higher. To keep up with these faster data transfer needs, fiber optic Internet access has been introduced to the public. Fiber optic Internet uses pulses of light to create an electromagnetic carrier wave that can be used to

    • How to Upgrade a CPU

      How to Upgrade a CPU

      You can upgrade an older microprocessor to a newer one in easy steps. Before going ahead, you should gather information about which new CPU you need and whether your motherboard is compatible with it or not. The compatibility of your new CPU with your motherboard can be ascertained by searching for specific information on the

    • How Optical Ultrasonic Cleaners Work

      How Optical Ultrasonic Cleaners Work

      Optical Ultrasonic Cleaners (sometimes referred to as Supersonic Cleaners) are electronic devices that use the power of ultrasound to clean items that are fragile or delicate. Ultrasound is sound waves that usually measure from 15-400 kHz. These sound frequencies have specific attributes that are beneficial in removing dirt and other forms of residue from a

    • What is Phosphorescence?

      What is Phosphorescence?

      Phosphorescence is an effect in which some chemicals re-emit light that they absorb. It is similar to fluorescence, except that the chemical reactions within phosphorescent materials happen less often, thus they take longer to emit light. Phosphorescent materials can be recharged by being exposed to light and may store light for several hours before it

    • IntraLATA

      IntraLATA

      IntraLATA refers to any telephone call that is made between two separate local telephone companies that are close enough to not constitute a long-distance call. To fully understand IntraLATA and InterLATA systems, a user must understand that a LATA, or Local Access and Transport Area, is a local telephone company that is responsible for managing

    • How to Link a Charter Email with Outlook

      How to Link a Charter Email with Outlook

      A Charter Pipeline email account is a high speed Internet account obtained through www.charter.com. Since users can add several email accounts to their Outlook, they can send and receive email messages from their Charter Pipeline account through Outlook. How to Link a Charter Email with Outlook Open Outlook. Click the Tools menu and select E-mail

    • DVI (Digital Visual Interface)

      DVI (Digital Visual Interface)

      DVI (Digital Visual Interface) is a video connector designed by the Digital Display Working Group (DDWG), aimed at maximizing the picture quality of digital display devices such as digital projectors and LCD screens. It is crafted for transporting uncompressed digital video information to a display screen. It is partly compatible with the High-Definition Multimedia Interface

    • Implementing and Managing Group Policy Objects (GPOs)

      Implementing and Managing Group Policy Objects (GPOs)

      On Overview on Group Policy Object (GPO) Implementation and the Group Policy Object Editor Group Policy settings are stored in a Group Policy Object (GPO). The types of Group Policy settings which can be stored in a GPO are listed below: Computer configuration settings are located in the Computer Configuration node. User configuration settings are

    • How to Audit Unix Passwords

      How to Audit Unix Passwords

      To audit Unix passwords, you must compare each encrypted password in the Unix password file with a set of potential encrypted passwords. These potential encrypted passwords are created by encrypting every password in a list of plaintext passwords. This is an example of a dictionary attack. The Unix passwd File Location The traditional location for

    175 queries in 0.518 seconds.