How to Strengthen Website Authentication
To achieve strong authentication on the Web, IT professionals must find a balance among three
separate forces whose goals are often at odds: the cost and security needs of the company, the
impact on user behavior, and the motivations of the would-be attacker. More ...
right on your local computer, not on the web server, and it's a scripting language meaning
it's run by an interpreter. More ...
How Computer Chips are Made
The oxygen is removed from silica by heating it with carbon. A tiny seed of silicon is then dipped
into molten silicon. As the tiny crystal is slowly lifted out of the crucible silicon crystallizes around it. More ...
Distance Vector vs. Link State vs. Hybrid Routing
Routers direct traffic between networks or subnetworks to transport a packet to its destination. Distance
Vector routing uses the hop count as its routing metric. Link State routing use statistics like distance, link speed,
and traffic to calculate the cost of different routes through the Internet. More ...
30 Questions comparing OSI and TCP/IP Models
This practice test contains 30 questions related to part 1.1 of the CompTIA Network+
Certification Exam - compare the layers of the OSI and TCP/IP models. More ...
A network switch operates at layer 2 the OSI model. A multilayer switch also works
at layer 3 or higher, all the way up to layer 6 of the OSI model. More ...
NTOSKRNL Missing or Corrupt Error Message
The file ntoskrnl.exe is a core Windows operating system file. If it's corrupt or missing
your PC will not be able to startup. This article shows you how to repair NTOSKRNL missing
or corrupt error. More ...
Man in the Middle Attack
In a Man in the Middle (MIM) attack the hacker places eavesdropping equipment between the
sending device and the receiving device. He intercepts the data, records it and possibly
modifies it, then sends it on to the intended receiving device. More ...
Selling Your eBook Through a Blog
The advantage of using your blog to sell your ebook is that you will have already developed targeted
traffic to your blog, visitors who are interested in the topic of your ebook. More ...
Understanding SSL Certificate
A secure web hosting service provider ensures safety protocols are in place by encrypting
the data that is submitted on an e-commerce website. A customer can identify if a website
is secure by checking for the padlock icon next to the URL. The address bar will also show
the URL as https instead of http. More ...
Create a Mouse Click Sound Effect
One way to add to the exerience of visiting your website is to provide sound effects.
It's extremely easy to add a click sound when a visitor clicks on a link. More ...
Keep Your Firefox Browsing Private
As you browse the web, Firefox saves a lot of information about your activities: phrases
you've typed into search engines, sites you've visited, files you've downloaded, and more.
There may be times, however, when you don't want other users of your computer to view this information. More ...
404 Error Page Options
When a user attempts to follow a broken or dead link the web server will generate a 404 error.
Most web hosts are configured by default to return a webpage displaying the standard 404 Error
message. A webmaster can use the website's control panel to configure an alternate 404 page. More ...
Stored Program Architecture
Almost every computer system ever made is based on the stored program architecture designed
in 1945 design by the mathematician John Von Neumann. He described a system where data and
instructions would be stored in memory. More ...
Cable: Cat5, Cat5e, Cat6, Cat6A ; What's the Difference?
This article describes the different twisted pair cable types, Cat5, Cat5e, Cat6, Cat6A, their construction and application. More ...
Search and Replace Strings
To search a string for a substring and replace the substring use the .substring method to
find the substring and break up the string, and use the concatenation operator to reconstruct
the string with the replacement substring. More ...
Creating a Secure Website Using Secure Socket Layer (SSL)
When setting up a website that will require payment through credit card it is important to have
a minimum level of security. One protocol that has effectively become the de facto standard for
website security is Secure Socket Layer (or SSL). More ...
Java Script Code to Re-arrange Items in a Select List
In this article you'll learn how to use Java Script to re-arrange items in a select list.
I'll explain the code in detail so that you'll be able to fully understand and modify it
for your own use. More ...
Make Money Writing Resumes and Curriculum Vitaes (CVs)
If you've got half-decent writing skills you could make an honest profit from offering a much-needed
CV writing service. As well as making money you'll have the satisfaction of helping hundreds or even
thousands of people to find their perfect job. More ...