• Main Menu
    • Honey Monkey

      Honey Monkey

      Honey monkeys are a new way of detecting malicious codes from websites that try to exploit certain vulnerabilities of Internet browsers. The honey monkey system works as an automated web/internet patrol system that is designed to detect harmful materials in the Internet, to be able to come up with solutions, and to catch the people

    • Understanding Systems Management Server (SMS)

      Understanding Systems Management Server (SMS)

      Systems Management Server (SMS) Overview SMS 2.0 is a Microsoft BackOffice systems management tool that can both operate in and manage an assortment of network environments. Systems Management Server (SMS) enables network environments and network resources to be centrally controlled. The core control point or center of Systems Management Server is the SMS Administrator console.

    • Touch Screen Monitors

      Touch Screen Monitors

      A touch screen is basically a display screen which can identify the occurrence and position of a touch within its own area. This usually refers to a touch or tap to the display of the gadget by a finger or hand. Touch screens can also identify added inactive objects, such as a stylus. Touch screens work

    • Understanding Forests and Domains

      Understanding Forests and Domains

      A domain is a collection of computers and resources that share a common security database, in this case, the Active Directory database. Computers in the domain also have a common namespace. A namespace is the hierarchical grouping of service and object names that are stored in Active Directory and DNS. Active Directory and DNS namespaces

    • Java Method

      Java Method

      Java Method is very much similar to a normal method or a function written within a class definition. Java method is basically a set of statements group together to perform a specific task. This method is included in a class. An object instantiated from a class can call methods of that class. Every Java method

    • Who Invented the Bullet Proof Vest?

      Who Invented the Bullet Proof Vest?

      Body armor has been in use by military forces since the early middle ages. Armor of metal, leather, cloth padding, silk and other plant material has been intrinsic to military actions since that time. The bullet proof vest, however, is a more recent invention with the specific design intent of protecting its wearer from firearm

    • Why is Geography Important?

      Why is Geography Important?

      While many of us labored to learn geography in school, we always wondered why it mattered. Here are some reasons why a sound understanding of geography is more important today than ever before. Politics We live in a world that is shaped by the political climate in various locations around the globe. In order to

    • Packet Sniffers

      Packet Sniffers

      Packet sniffing is listening (with software) to the raw network device for interesting packets. When the software sees a packet that fits certain criteria, it logs it to a file. The most common criterion for an interesting packet is one that contains words like “login” or “password.” To packet sniff, obtain or code a packet

    • Flashing Firmware

      Flashing Firmware

      Firmware refers to the microprograms present on ROM (Read Only Memory) modules, which contain low-level (e.g., hexadecimal, machine code) software. They enable the device on which they are present to take stock of its capabilities and to render those capabilities functional. The information loaded onto the ROM is non-volatile meaning that it is not lost

    • Java Operators

      Java Operators

      Java Operator Operator Description [ ] Array index () Method call . Member access ++ Prefix or postfix increment — Prefix or postfix decrement + – Unary plus, minus ~ Bitwise NOT ! Boolean (logical) NOT (type) Type cast new Object creation * / % Multiplication, division, remainder + – Addition, subtraction + String concatenation

    175 queries in 0.621 seconds.