Adding Space Around an Image
With the html hspace and vspace attributes you can control the space around an image.
Although these attributes were deprecated in HTML 4.01, they still work in all modern browsers. More ...
Has Your Search Position and Website Traffic Disappeared?
If your Google search position has disappeared and along with your traffic, it's partially
because of Google's arbitrary search rules and their need to show growth in revenue and profit. More ...
It would be inefficient to return an ACK message as each segment is received. The number
of segments received before an ACK message is returned is called the TCP receive window size. More ...
A server is a computer in a client/server network that provides services or roles on a network and
provides a central location for administration of the network. More ...
Repairing Internet Explorer
Because the Windows operating system relies on many components of Internet Explorer,
any problems with Internet Explorer can affect other areas of the system. More ...
Intoduction to Digital Electronics
The entire field of computer technology relies on transistors. This article describes how transistors
are constructed and how modern MOSFETs are combined to make digital logic circuits. More ...
right on your local computer, not on the web server, and it's a scripting language meaning
it's run by an interpreter. More ...
How Computer Chips are Made
The oxygen is removed from silica by heating it with carbon. A tiny seed of silicon is then dipped
into molten silicon. As the tiny crystal is slowly lifted out of the crucible silicon crystallizes around it. More ...
30 Questions Related to Classes of Addresses
30 questions related to Part 1.3 of the CompTIA Network+ Certification Exam - Classes
of addresses. Even though address classes has been abandoned for more flexible classless
addressing, it's still covered in the exam, and understanding address classes is a good
introduction to classless addressing and subnetting. More ...
Creating a Secure Website Using Secure Socket Layer (SSL)
When setting up a website that will require payment through credit card it is important to have
a minimum level of security. One protocol that has effectively become the de facto standard for
website security is Secure Socket Layer (or SSL). More ...
Built-in Utilities for Network Troubleshooting
One of the most important responsibilities of a network administrator is to fix any problems
that arise with the network. Most operating systems come with built-in utilities that can be
used in the troubleshooting process. Described here are the most useful of these utilities. More ...
Stored Program Architecture
Almost every computer system ever made is based on the stored program architecture designed
in 1945 design by the mathematician John Von Neumann. He described a system where data and
instructions would be stored in memory. More ...
Computer Number Systems Made Simple
Humans use a decimal based number system. The decimal numbering system uses the ten characters 0,1,2,3,4,5,6,7,8,
and 9 to represent numbers. The binary system used by computers has only two characters; 0 and 1. More ...
Distance Vector vs. Link State vs. Hybrid Routing
Routers direct traffic between networks or subnetworks to transport a packet to its destination. Distance
Vector routing uses the hop count as its routing metric. Link State routing use statistics like distance, link speed,
and traffic to calculate the cost of different routes through the Internet. More ...
The Fetch, Decode, Execute Cycle
The Fetch, Decode, Execute cycle is paramount to the functioning of a microprocessor. In this article
I'll describe the Fetch, Decode, Execute cycle simplified to its bare-bones in a highly simplified fictitious microprocessor. More ...
21 Realistic Part-Time Income Opportunities
Looking for a way to make money? Earn money without disrupting your current lifestyle.
You can start making money with easy work that fits around your schedule. This book will
provide you with 21 realistic part-time income opportunities. More ...
Avoid Plagiarism and Copyright Infringement
In our writing, two things that are obviously to be avoided are plagiarism and copyright infringement.
Although plagiarism and copyright infringement are similar, there is a subtle difference between the two. More ...
What Are WEP, WPA, TKIP, AES and PSK?
The acronyms WEP, WPA, TKIP, AES and PSK are all rlated to encryption used in wireless networking.
This article explains their meaning in simple terms. More ...
What Kind of Fire Extinguisher Should I Buy?
A fire extinguisher is something you simply must have. It can keep a small fire from raging out of control.
There are several types of extinguishers, designed for different kinds of fires. More ...