Network Schematic Symbols
A network diagram is a map of the nodes and connections in a computer network. Cisco's
icons are globally recognized and generally accepted as standard for network topology design. More ...
Form Input Labels
Using the label element with your form input elements rather than just placing text
next to them is a good idea that makes your web site more accessible. More ...
How Snort's Stealth TCP Port Scanning Works
Snort is an open source network intrusion detection system, capable of performing real-time traffic
analysis and packet logging on IP networks. It can perform protocol analysis, content searching
and matching, and can be used to detect a variety of attacks and probes. More ...
Binary Floating-Point Numbers
Floating-point numbers allow you to use the very large, and very small, numbers commonly found
in scientific calculations. A binary floating-point number consists of three parts, the sign bit, the mantissa and the exponent. More ...
How to Resolve Windows 7 BOOTMGR Missing Error
BOOTMGR is missing error occurs when Windows is corrupted Windows or it is trying to boot from
a wrongly configured or improperly connected hard drive. More ...
Are You Meeting ISO 27000 Standards for Information Security Management?
The ISO 27000 standard developed by The (IEC) and (ISO) is an internationally accepted industry
standard for Information Security Management (ISM). More ...
Computer Video Display
If you view a computer as an input-processing-output machine, you can use a keyboard
or removable storage device as the input, a program as the processing, but what can you
use to retrieve the output? One way to acquire the output, be it text or graphics, is with a video display. More ...
Where To Find Free Stock Photography, Clip Art, And Other Graphics For Your Web Site
This article provides four resources where you can find free stock photography, clip art, and other graphics for your web site. More ...
What You Need to Know to Become an Information Security Analyst
Information security analysts analyze threats and vulnerabilities that are associated with computer networks.
Salaries for information security specialists range from $89,000.00 to more than $121,000.00. More ...
Nine Tips for Designing a Small Business Network
Technology professionals can get wrapped up in a lot of detail while planning and designing
systems. It is up to the business to ensure that the needs and requirements of the business
are considered throughout the planning process. More ...
How to Use the Open Source Intrusion Detection System SNORT
In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion
Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of
documentation or ease of use, however, SNORT can seem overwhelming. More ...
Understanding Windows 7 Security Center
Windows Security Center is a security tool that allows you to monitor the status of computer
security settings and services. It also constantly monitors security settings, and informs via
a pop-up notification if there is something wrong. In Windows 7 Microsoft renamed it as Action Center. More ...
Dealing With Stress at Work
You can't totally avoid stress. Stress is a normal part of life and work, but too much stress can
actually cause health problems. Here's how to deal with too much stress at work. More ...
Building the Backbone Network
The backbone is a network, the function of which is to connect the LANs together. There are no
workstations connected directly to the backbone. In some cases, you might connect servers to it,
but most backbones carry nothing but internetwork traffic. More ...
Web Site Design Layout - Five Common Elements
A basic web site design layout doesn't have to include bells and whistles and flashing images.
It simply has to provide a pleasing format in which to present your content. Don't over think it. More ...
How to Tell if Someone is Lurking on Your Wireless Network
Have you ever wondered if someone else is on your wireless network, with out your knowledge,
watching every site you visit or stealing account information? More ...
A microcontroller is an IC that contains a microprocessor as well as RAM, ROM and general I/O ports.
Engineers design microcontrollers into specific-purpose devices such as microwave ovens, cars,
washing machines, refridgerators, and even space probes. More ...
15 Easy Steps to Starting Your Own Small Business
When I decided to start my business, I tried hard to find a good startup guide. I couldn't
find anything that had all the steps clearly listed without a lot of confusing fluff and filler. More ...
IP version 6 (IPv6) Advantages and Implementation
The Internet has, to all intents and purposes, run out of public IP version 4 addresses. The solution
to this issue is new IP version 6. This would require a parallel IPv6 based Internet to be running
until all IPv4 connections have been converted. More ...