• Main Menu
    • What is a Biometric Coprocessor?

      What is a Biometric Coprocessor?

      A biometric coprocessor is a device that is capable of scanning a user’s physical attributes in order to allow access to a building or computer network. A biometric coprocessor is essentially a fingerprint reader, but may also include sensors that analyze the user’s eyes, voice, or even breath. The term “biometric coprocessor” comes from the

    • Developing a Test Network

      Developing a Test Network

      Planning the Test Network Environment Any successful network design deployment includes a testing strategy, and the execution of the testing plan. To test the network design, you have to plan the test network or environment, and then create the test network. A testing environment can contain one lab or multiple labs. You can build various

    • How to Create a Windows Vista Boot Disk

      How to Create a Windows Vista Boot Disk

      In order to create a Windows Vista boot disk, the Windows Vista operating system’s ISO file must be located and downloaded. Microsoft, Dell, and several other computer manufacturers have this file as a downloadable version of the operating system disk, and allows users to create their own disk without having to wait for a physical

    • How to Erase a Hard Drive in Windows

      How to Erase a Hard Drive in Windows

      Erasing a hard drive is relatively straight forward and only takes about an hour to accomplish. There are several ways to erase a hard drive and each method has its own advantages and disadvantages. Below are few methods for reformatting, using disk sanitizing software, or specifically deleting files. Erase a Hard Drive by Reformatting It

    • How Do QR Codes Work?

      How Do QR Codes Work?

      What is a QR Code? Before answering the question about how QR codes work, it is important to first understand what a QR code is. In 1994, a Japanese corporation unveiled the Quick Response technology. It has since become one of the most popular two dimensional barcode available and is believed to be faster than

    • GSM (Global System for Mobile Communications)

      GSM (Global System for Mobile Communications)

      The Global System for Mobile Communications (GSM) system is a widely deployed digital mobile telephony standard that is deployed throughout Europe and other locations around the globe. The GSM standard leverages a variant of TDMA (time division multiple access) and is the most deployed of the three competing legacy digital wireless technologies on the market

    • PGP (Pretty Good Privacy)

      PGP (Pretty Good Privacy)

      PGP (Pretty Good Privacy) is a data encryption and decryption program used in e-mail messaging, encrypting/decrypting texts, files, or even disk partitions, in order to provide security of data. The program was created in 1991, by Phil Zimmerman. Pretty Good Privacy encryption is based on using a serial combination of data compression, hashing, public-key cryptography

    • How a Rear Projection TV Works

      How a Rear Projection TV Works

      As it sounds, a projection television, or more commonly a "rear-projection" TV work by projecting an image from behind the screen itself. Currently, there are three main types of technology used in rear-projection TV's: CRT, LCD, and DLP. Each uses a combination of projection devices, magnification lenses, mirrors, and screens to produce the image seen.

    • Liquid Armor

      Liquid Armor

      Liquid armor is a new development in the body armor field. It is a material that makes lightweight, flexible and tough body armors possible. Body Armor Body armor is a protective clothing designed to stop bullets or bomb fragments and shrapnel from penetrating the human body. They are descended from leather or metal armor designed

    • War Dialing

      War Dialing

      War dialing, also called scanning, is dialing a large number of telephone numbers in the hope of finding anything interesting. Interesting items often include test tones, computers, Voice Mail Boxes (VMB's), Private Branch Exchanges (PBX's), and government offices. A common technique is to find one telephone number owned by a target and then to war

    174 queries in 0.522 seconds.